Statements (54)
Predicate | Object |
---|---|
gptkbp:instanceOf |
cybersecurity practice
|
gptkbp:benefit |
enhances security culture
identifies weaknesses before attackers realistic threat simulation |
gptkbp:canBe |
covert
overt |
gptkbp:challenge |
requires skilled personnel
potential for disruption resource intensive |
gptkbp:duration |
varies
|
gptkbp:focusesOn |
simulated cyber attacks
|
gptkbp:frequency |
periodic
ad hoc |
gptkbp:goal |
test organizational security
|
https://www.w3.org/2000/01/rdf-schema#label |
Red Team Operations
|
gptkbp:improves |
security posture
|
gptkbp:includes |
social engineering
phishing campaigns penetration testing physical security testing |
gptkbp:performedBy |
external consultants
internal teams red team |
gptkbp:platform |
gptkb:CBEST
gptkb:TIBER-EU gptkb:MITRE_ATT&CK gptkb:NIST_SP_800-115 |
gptkbp:provides |
recommendations
|
gptkbp:recognizedBy |
vulnerabilities
gaps in defenses |
gptkbp:relatedTo |
penetration testing
blue team operations purple team operations |
gptkbp:reportsTo |
organization leadership
|
gptkbp:requires |
gptkb:government_agency
rules of engagement |
gptkbp:result |
increased awareness
improved incident response security assessment report |
gptkbp:scope |
may include IT, OT, physical, and personnel security
defined by organization |
gptkbp:target |
blue team
|
gptkbp:testedBy |
incident response
detection capabilities prevention controls |
gptkbp:usedBy |
gptkb:government
financial institutions government organizations critical infrastructure providers |
gptkbp:uses |
adversary emulation
tactics, techniques, and procedures (TTPs) |
gptkbp:bfsParent |
gptkb:Privilege_Escalation
gptkb:Cobalt_Strike |
gptkbp:bfsLayer |
6
|