Statements (53)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cybersecurity_practice
|
| gptkbp:benefit |
enhances security culture
identifies weaknesses before attackers realistic threat simulation |
| gptkbp:canBe |
covert
overt |
| gptkbp:challenge |
requires skilled personnel
potential for disruption resource intensive |
| gptkbp:duration |
varies
|
| gptkbp:focusesOn |
simulated cyber attacks
|
| gptkbp:frequency |
periodic
ad hoc |
| gptkbp:goal |
test organizational security
|
| gptkbp:improves |
security posture
|
| gptkbp:includes |
social engineering
phishing campaigns penetration testing physical security testing |
| gptkbp:performedBy |
external consultants
internal teams red team |
| gptkbp:platform |
gptkb:CBEST
gptkb:TIBER-EU gptkb:MITRE_ATT&CK gptkb:NIST_SP_800-115 |
| gptkbp:provides |
recommendations
|
| gptkbp:recognizedBy |
vulnerabilities
gaps in defenses |
| gptkbp:relatedTo |
penetration testing
blue team operations purple team operations |
| gptkbp:reportsTo |
organization leadership
|
| gptkbp:requires |
gptkb:government_agency
rules of engagement |
| gptkbp:result |
increased awareness
improved incident response security assessment report |
| gptkbp:scope |
may include IT, OT, physical, and personnel security
defined by organization |
| gptkbp:target |
blue team
|
| gptkbp:testedBy |
incident response
detection capabilities prevention controls |
| gptkbp:usedBy |
gptkb:government
financial institutions government organizations critical infrastructure providers |
| gptkbp:uses |
adversary emulation
tactics, techniques, and procedures (TTPs) |
| gptkbp:bfsParent |
gptkb:Cobalt_Strike
|
| gptkbp:bfsLayer |
6
|
| https://www.w3.org/2000/01/rdf-schema#label |
Red Team Operations
|