Blue Team, Red Team, and Purple Team: An Overview
ATT&CK techniques detected
T1526Cloud Service Discovery
53%
“easily deployable in the azure cloud. includes active directory, attacker and victim machines, and log aggregation in sentinel. read more in our “ infosec for beginners ” blog series : - how to get a job in cybersecurity - john strand ’ s 5 phase plan for starting in computer sec…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.001Malware
51%
“##ers to be aware and on the lookout. why do it? blue teamers need to understand adversary ttps to defend against them. red teamers know these ttps and can execute them. purple teaming can be an effective way to bring this together. here are some potential use - cases : - validat…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1588.006Vulnerabilities
34%
“attacks, you needs to know about the tools and techniques available to defend with, as well as what tools and techniques your attackers are using. knowledge is power! blue team resources vulnerabilities vulnerabilities are tracked by their cve ( common vulnerabilities and exposur…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary

By Erik Goldoff, Ray Van Hoose, and Max Boehner || Guest Authors This post is comprised of 3 articles that were originally published in the second edition of the InfoSec […]
The post Blue Team, Red Team, and Purple Team: An Overview appeared first on Black Hills Information Security, Inc..