{"id":7842,"date":"2020-01-03T00:00:00","date_gmt":"2020-01-03T00:00:00","guid":{"rendered":"https:\/\/www.x4-technology.com\/2020\/01\/03\/red-teaming-is-the-smart-way-to-determine-security-maturity\/"},"modified":"2022-03-22T13:49:59","modified_gmt":"2022-03-22T13:49:59","slug":"red-teaming-is-the-smart-way-to-determine-security-maturity","status":"publish","type":"post","link":"https:\/\/www.x4-technology.com\/de\/red-teaming-is-the-smart-way-to-determine-security-maturity\/","title":{"rendered":"Red teaming is the smart way to determine security maturity"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;dark&#8220;][vc_column][vc_column_text]Sometimes attack is the best form of defence and that\u2019s the concept behind\u00a0<em>red teaming<\/em>\u00a0in cyber security. Red teaming pits two security teams against each other (an attacker and a defender). The attacker is a team of ethical hackers \u2013 the defender is an organisation\u2019s team of cyber security personnel.<\/p>\n<p>The point of the exercise is to assess blue team\u2019s response to an attack and identify weak points.\u00a0<em>It\u2019s a way to determine security maturity.<\/em>\u00a0Often, it\u2019s the only way to see what the outcome of a cyber-attack would be in real-world situations. This is achieved by deploying red team without giving blue team any prep. Think unplanned fire drill.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;light&#8220;][vc_column][vc_column_text]<\/p>\n<p style=\"padding-top: 30px\"><strong>The teams<\/strong><\/p>\n<p><em>Red team<\/em><\/p>\n<p>Red team consists of ethical hackers. They\u2019re formed to identify and assess any vulnerabilities in security. Their attack will reveal the security limitations and risks in an organisation, so that the organisation can act on them. The process is repeatable periodically, using different hackers, so that new, alternate options for attack are created and implemented. This keeps the test current and up to date.<\/p>\n<p><em>Blue team<\/em><\/p>\n<p>Blue team consists of an organisation\u2019s cyber security personnel. Depending on the organisation\u2019s structure, these personnel may include a security analyst, security engineer, security architect or security administrator. Some organisations have people in specialised roles, such as security incident responders. Whatever the case, blue team is made up of the people who would likely respond to an attack in real-time.<\/p>\n<p><strong>How teams are formed<\/strong><\/p>\n<p><em>Red team<\/em><\/p>\n<p>Red team is formed by review. It can be a team within the organisation, but most teaming sees an external force brought in. This brings new ideas into the fray and can expose personnel to hackers of a higher calibre than they\u2019ve experience before. Red team is formed to offer a tough challenge.<\/p>\n<p><em>Blue team<\/em><\/p>\n<p>Blue team is formed by bringing together the least and most experienced cyber security personnel in an organisation. This mix of cyber security boffins creates realistic conditions for the attack. Some logistics may be required to bring everyone together without giving up the game. Reassignment may be needed.[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;dark&#8220;][vc_column][vc_column_text]<\/p>\n<p style=\"padding-top: 30px\"><strong>When to deploy a red team<\/strong><\/p>\n<p>A red team can be set loose in your environment at any time. However, most tests are reactive and will be carried out when:<\/p>\n<ul>\n<li><strong>A new security software or program is deployed.<\/strong>\u00a0Deploy a red team here to see how the software fairs against real attackers.<\/li>\n<li><strong>When a new type of cyber-attack becomes known.<\/strong>\u00a0Deploy a red team here to give your blue team real-world experience of the unknown.<\/li>\n<li><strong>When a security team changes (such as the addition of new personnel).<\/strong>\u00a0Deploy a red team here to assess blue team\u2019s new members.<\/li>\n<\/ul>\n<p><strong>The effectiveness of red teaming<\/strong><\/p>\n<p>Red teaming is highly effective at ensuring you have the appropriate measures in place to secure your organisation. Without prior warning to blue team, your organisation will come under cyber-attack. This\u2019ll force blue team to kick into action, just like a squadron under fire, and it can be very interesting to see how they react.<\/p>\n<p>Will they follow protocol and neutralise the threat? Or will they lose their heads?<\/p>\n<p>The members of blue team are evaluated in addition to the organisation\u2019s security infrastructure, helping to create a true security picture and a complete risk profile. This can then be used to improve cyber security before the next test.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;dark&#8220;][vc_column][vc_column_text]Sometimes attack is the best form of defence and that\u2019s the concept behind\u00a0red teaming\u00a0in cyber security. Red teaming pits two security teams against&#8230;<\/p>\n","protected":false},"author":1,"featured_media":9739,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,715],"tags":[],"class_list":["post-7842","post","type-post","status-publish","format-standard","hentry","category-insights","category-thought-leadership"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Red teaming is the smart way to determine security maturity - X4 Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Red teaming is the smart way to determine security maturity - X4 Technology\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;dark&#8220;][vc_column][vc_column_text]Sometimes attack is the best form of defence and that\u2019s the concept behind\u00a0red teaming\u00a0in cyber security. Red teaming pits two security teams against...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/\" \/>\n<meta property=\"og:site_name\" content=\"X4 Technology\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-03T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-22T13:49:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.x4-technology.com\/wp-content\/uploads\/sites\/18\/2020\/01\/Thought-Leadership-Blog-Posts-31.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"655\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"x4group_cms\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"x4group_cms\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/\"},\"author\":{\"name\":\"x4group_cms\",\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/#\\\/schema\\\/person\\\/7b98a0a3e9518ee1471a804ae06c7889\"},\"headline\":\"Red teaming is the smart way to determine security maturity\",\"datePublished\":\"2020-01-03T00:00:00+00:00\",\"dateModified\":\"2022-03-22T13:49:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/\"},\"wordCount\":645,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.x4-technology.com\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2020\\\/01\\\/Thought-Leadership-Blog-Posts-31.jpg\",\"articleSection\":[\"Insights\",\"Thought Leadership\"],\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/\",\"url\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/\",\"name\":\"Red teaming is the smart way to determine security maturity - X4 Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.x4-technology.com\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2020\\\/01\\\/Thought-Leadership-Blog-Posts-31.jpg\",\"datePublished\":\"2020-01-03T00:00:00+00:00\",\"dateModified\":\"2022-03-22T13:49:59+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/#\\\/schema\\\/person\\\/7b98a0a3e9518ee1471a804ae06c7889\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/us\\\/red-teaming-is-the-smart-way-to-determine-security-maturity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.x4-technology.com\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2020\\\/01\\\/Thought-Leadership-Blog-Posts-31.jpg\",\"contentUrl\":\"https:\\\/\\\/www.x4-technology.com\\\/wp-content\\\/uploads\\\/sites\\\/18\\\/2020\\\/01\\\/Thought-Leadership-Blog-Posts-31.jpg\",\"width\":1200,\"height\":655},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/#website\",\"url\":\"https:\\\/\\\/www.x4-technology.com\\\/\",\"name\":\"X4 Technology\",\"description\":\"Technology Recruitment Specialists\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.x4-technology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.x4-technology.com\\\/#\\\/schema\\\/person\\\/7b98a0a3e9518ee1471a804ae06c7889\",\"name\":\"x4group_cms\",\"url\":\"https:\\\/\\\/www.x4-technology.com\\\/de\\\/author\\\/x4group_cms\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Red teaming is the smart way to determine security maturity - X4 Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/","og_locale":"de_DE","og_type":"article","og_title":"Red teaming is the smart way to determine security maturity - X4 Technology","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; el_class=&#8220;dark&#8220;][vc_column][vc_column_text]Sometimes attack is the best form of defence and that\u2019s the concept behind\u00a0red teaming\u00a0in cyber security. Red teaming pits two security teams against...","og_url":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/","og_site_name":"X4 Technology","article_published_time":"2020-01-03T00:00:00+00:00","article_modified_time":"2022-03-22T13:49:59+00:00","og_image":[{"width":1200,"height":655,"url":"https:\/\/www.x4-technology.com\/wp-content\/uploads\/sites\/18\/2020\/01\/Thought-Leadership-Blog-Posts-31.jpg","type":"image\/jpeg"}],"author":"x4group_cms","twitter_card":"summary_large_image","twitter_misc":{"Written by":"x4group_cms","Est. reading time":"3 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/#article","isPartOf":{"@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/"},"author":{"name":"x4group_cms","@id":"https:\/\/www.x4-technology.com\/#\/schema\/person\/7b98a0a3e9518ee1471a804ae06c7889"},"headline":"Red teaming is the smart way to determine security maturity","datePublished":"2020-01-03T00:00:00+00:00","dateModified":"2022-03-22T13:49:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/"},"wordCount":645,"commentCount":0,"image":{"@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.x4-technology.com\/wp-content\/uploads\/sites\/18\/2020\/01\/Thought-Leadership-Blog-Posts-31.jpg","articleSection":["Insights","Thought Leadership"],"inLanguage":"de-DE","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/","url":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/","name":"Red teaming is the smart way to determine security maturity - X4 Technology","isPartOf":{"@id":"https:\/\/www.x4-technology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/#primaryimage"},"image":{"@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.x4-technology.com\/wp-content\/uploads\/sites\/18\/2020\/01\/Thought-Leadership-Blog-Posts-31.jpg","datePublished":"2020-01-03T00:00:00+00:00","dateModified":"2022-03-22T13:49:59+00:00","author":{"@id":"https:\/\/www.x4-technology.com\/#\/schema\/person\/7b98a0a3e9518ee1471a804ae06c7889"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.x4-technology.com\/us\/red-teaming-is-the-smart-way-to-determine-security-maturity\/#primaryimage","url":"https:\/\/www.x4-technology.com\/wp-content\/uploads\/sites\/18\/2020\/01\/Thought-Leadership-Blog-Posts-31.jpg","contentUrl":"https:\/\/www.x4-technology.com\/wp-content\/uploads\/sites\/18\/2020\/01\/Thought-Leadership-Blog-Posts-31.jpg","width":1200,"height":655},{"@type":"WebSite","@id":"https:\/\/www.x4-technology.com\/#website","url":"https:\/\/www.x4-technology.com\/","name":"X4 Technology","description":"Technology Recruitment Specialists","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.x4-technology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/www.x4-technology.com\/#\/schema\/person\/7b98a0a3e9518ee1471a804ae06c7889","name":"x4group_cms","url":"https:\/\/www.x4-technology.com\/de\/author\/x4group_cms\/"}]}},"_links":{"self":[{"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/posts\/7842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/comments?post=7842"}],"version-history":[{"count":3,"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/posts\/7842\/revisions"}],"predecessor-version":[{"id":9946,"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/posts\/7842\/revisions\/9946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/media\/9739"}],"wp:attachment":[{"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/media?parent=7842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/categories?post=7842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.x4-technology.com\/de\/wp-json\/wp\/v2\/tags?post=7842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}