The merits of deploying offensive testing to strengthen an organization’s security posture are well-understood by today’s security leadership. Much to the relief of defenders, obtaining approval for an offensive security exercise has never been easier.
However, the process of selecting the most appropriate offensive testing solution requires untangling overlapping definitions and vaguely defined terminology that leaves security teams more confused than when they started.
How is an Adversary Emulation different from a Red Team? What about this new Breach and Attack Simulation (BAS) tool that has been receiving great publicity recently? Would it be simpler to just invest in a Penetration Test instead?
To help break all this down, we will provide a framework to understand the value proposition of different offensive security services from a defender’s perspective, focusing on the core assumptions underlying each solution’s methodology. We will also identify important factors that help with narrowing down which form of offensive testing is best suited for your organization.
To understand the differences between types of offensive testing, consider the following:
This framework allows us to classify offensive security services into four general categories.
Figure 1. Four general categories.
Although there is often methodological overlap between the four quadrants, this model can be used to make sense of industry terminology from a defender’s point of view by focusing on the how and the why of conducting offensive security testing.
To use a domestic analogy, let’s assume you want to ensure your home is safe from being broken into. The type of test you choose will dictate what you learn about your security posture.
When selecting an offensive security service, organizations should first ensure that foundational defensive controls are in place. Engaging a Red Team without having validated basic controls will surface findings that would likely also have been discovered with Penetration Testing.
While it is tempting to jump directly to the “most realistic” form of security testing, this misconception results in limited value being obtained from an offensive security exercise. Adversaries will take the path of least resistance into an organization - before smashing the window, a burglar will pick your lock, but before that, they will certainly just try the handle.