Assume Breach exercise helps identify vulnerabilities and improve cybersecurity posture
An Assume Breach test aims to simulate a cyber-attack on The Customer’s systems and defenses. The goal is to identify potential vulnerabilities and weaknesses in The Customer’s security posture.
By simulating a cyber-attack, The Customer can better understand where their defenses are strong and where they need to be improved. This can help the Customer prioritize their security efforts and make the necessary investments to strengthen their defenses.
CSIS can combine key elements of a simulated cyber-attack and build a test that reflects the risk appetite, the budget, and the compliance requirements of The Customer
We do this by introducing a “Patient Zero” PC to the customer’s network. Once the PZ is given power and wired internet, it will act as an infected PC and will be used to gather intel from the customer’s network.
When we have gathered sufficient intel, which usually takes 2-4 weeks, we will initiate a range of simulated attacks, documenting how we compromise the network along the way.
All findings and actionable recommendations for mitigations are then shared with the customer in the form of a report.
We can either do it as an ad-hoc “see how far we get” exercise or go specifically after up to three targets pre-defined by the customer (e.g., compromising the Active Directory, the organization’s ERP system, or even the CTO’s email).
Assume Breach may include, but are not limited to:
You have the option to expand the Assume Breach test with a range of add-ons.
The possible add-ons are:Why should you conduct an Assume Breach Test?
An Assume Breach test lets you:
REST ASSURED.
Rest Assured.
We are the leader in actionable and intelligence-driven detection and response services.