Rest assured

ASSUME BREACH

Pinpoint your cybersecurity weak points.
Technology and security
Context

Testing your defenses

Assume Breach exercise helps identify vulnerabilities and improve cybersecurity posture

An Assume Breach test aims to simulate a cyber-attack on The Customer’s systems and defenses. The goal is to identify potential vulnerabilities and weaknesses in The Customer’s security posture.

By simulating a cyber-attack, The Customer can better understand where their defenses are strong and where they need to be improved. This can help the Customer prioritize their security efforts and make the necessary investments to strengthen their defenses.

CSIS can combine key elements of a simulated cyber-attack and build a test that reflects the risk appetite, the budget, and the compliance requirements of The Customer

 

How it works

Discover how vulnerable your most critical assets are to cyber attacks

We do this by introducing a “Patient Zero” PC to the customer’s network. Once the PZ is given power and wired internet, it will act as an infected PC and will be used to gather intel from the customer’s network.

When we have gathered sufficient intel, which usually takes 2-4 weeks, we will initiate a range of simulated attacks, documenting how we compromise the network along the way.

All findings and actionable recommendations for mitigations are then shared with the customer in the form of a report.

We can either do it as an ad-hoc “see how far we get” exercise or go specifically after up to three targets pre-defined by the customer (e.g., compromising the Active Directory, the organization’s  ERP system, or even the CTO’s email).

Rest-assured
Our methodology

Improve your cyber security posture

Assume Breach may include, but are not limited to:

  • Exposing insufficient network protection
  • Use of weak user credentials
  • Exploitation of vulnerabilities in embedded devices
  • Try to gain domain admin credentials
  • Extraction of data
Business-man-signing-contract-making-a-deal
Add-on services

We can model the test to reflect your risk appetite, budget, and customer compliance requirements

You have the option to expand the Assume Breach test with a range of add-ons.

The possible add-ons are:

  • Advanced Purple Teaming, where we engage your SOC in a training workshop, that will ensure that it is - or will be - able to detect the tactics and techniques used in the exercise, supplemented with more than 30 simulated attacks, that cover the Cyber Attack Kill-Chain.
  • Phishing Campaign, where we fire off two customized spear-phishing attacks against your company, to test the resilience of your end users.
  • Physical Penetration test, where we try to gain physical access to your network by, among other things, sneaking, lock-picking, and swindling our way into the customer’s physical premises, and plant digital surveillance equipment.
  • Password analysis, where we try to brute force your hashed AD passwords, report on the general sophistication level of the customer’s passwords and generalize end-user compliance with any given password policy.
  • Intelligence Gathering, where we investigate what type of exploitable intel about your company and employees are available in the channels and repositories available to us.

Benefits

Why should you conduct an Assume Breach Test?
An Assume Breach test lets you:

Search 1
Identify weaknesses and vulnerabilities in the organization's security posture
Redirection
Determine whether your critical assets and data are at risk
Destruction
Mitigate financial, operational, and reputational losses caused by cyber-attacks
Shield 2
Identify cyber security weaknesses before an attacker exploits them
Group 57 (1)
Learn more

"A CSIS Assume Breach service will improve your security posture by identifying security weaknesses before a real attacker can exploit them."

REST ASSURED.

SEE US IN ACTION

Request a call

Rest Assured.

We are the leader in actionable and intelligence-driven detection and response services.