Red Teaming

Red Teaming is a comprehensive security assessment in which 2NS utilizes real-world attacker tactics, techniques and procedures (TTPs) to evaluate target organization’s security. By emulating a realistic attack scenario, Red Teaming helps to identify weaknesses in the people, process and technologies used to defend the organization, and thus improves the organization’s capability to detect and react to security incidents.

Red Teaming projects are objective-based, and the goal is to emulate attacker’s actions in the target environment. The 2NS Red Team can utilize non-technical TTPs such as social engineering or even physical intrusion to meet the goals set for the project. The TTPs utilized in the project are selected based on the project’s goals, such as “Access server x containing business-critical data without alerting the organization’s cyber defense team“. 2NS Red Team follows the industry best practices and the latest threat information and research to emulate a realistic threat actor.

2NS also has experience in conducting Red Teaming projects using the TIBER-FI framework.

Red Teaming excercise

  • Simulates how real threat actors would approach your organization as a target
  • Helps you asses what are the biggest risks and weakpoints in your security
  • Is a good reminder about how complex combination of physical and cybersecurity actually is

Benefits of Red Teaming

  • Proactively test organization’s response to a targeted attack.
  • Validate effectiveness of security controls.
  • Evaluate defense’s maturity level.

Red Teaming does not focus on discovering technical vulnerabilities in the target environment. However, vulnerabilities may be used to achieve certain goals set for the project. 2NS also provides services more-related to vulnerability discovery and assessment, such as Penetration Testing.

2NS provides the customer a detailed timeline of attacking events that can be correlated with SOC’s timeline to identify gaps in the security monitoring process.

Contact us

2NS Provides Red Teaming Services Using Two Main Threat Scenarios:

01

Full Engagement Model

2NS performs a complete, end-to-end Red Teaming engagement starting from OSINT and external reconnaissance where no initial access to the organization’s internal networks is provided. The full engagement model requires usually more time than assumed breach.

02

Assumed Compromise

In this model, an assumption is made that the simulated attacker has some level of access to the target at the start of the project. In this model, the attacker’s access can be simulated for example using a “stolen laptop”, by providing initial access password or by launching 2NS Red Team’s simulated malware that provides command and control. Assumed compromise model can be performed in a shorter period of time than the end-to-end full engagement model.

How a Red Teaming Project Works?

  • Project goals and methods are agreed with the customer.
  • Our team plans and executes the attacks based on information gathered and given.
  • Observations from attempted or successful attacks are gathered and reported to the customer.
CONTACT US

CSC

“I highly recommend 2NS for both individual technical cybersecurity training projects and for more comprehensive cybersecurity partnerships.”

Urpo Kaila , Information Security Manager – CSC

CableCrew Oy

”The collaboration went so well that from now on, we will use 2NS for our annual audits. Cybersecurity is extremely important to CableCrew because we operate in critical infrastructure. Communication was straightforward, and availability was excellent even outside business hours when needed. All questions were answered by the next day at the latest. Schedules were also communicated in real time.”

Satu-Maria Ravelin, HESQ Director – CableCrew Oy

Kehätieto Oy

“Our collaboration with 2NS has proceeded very smoothly. We have received the support we needed from them for both staff training and security testing of our products. We trust 2NS’s specialized expertise in cybersecurity matters.”

Juhani Ruohotie, Team leader – Kehätieto Oy