Alain Mowat, Head of Research and Development at SCRT
Purple teaming our way to SOC efficiencyMost companies have now implemented some kind of Security Operations Center whose role is to detect and respond to security incidents. They often leverage Endpoint Detection & Response telemetry for this task. Despite these tools and processes, we have performed many pentesting engagements where the SOC was either unable to detect the attacks we take out or responded too late to have any kind of impact. This has also been shown in certain real-life incident response scenarios, where despite having one or even multiple EDR solutions, clients have had their information systems fully encrypted.
This is generally due to the following issues:
- Current attacks rarely exploit vulnerabilities but tend to target insecure (often default) configurations, typically in Windows and Active Directory. This is a lot harder to detect than a malicious executable file communicating with a C2.
- Even if there is some telemetry returned for the attacks, the defense teams are unable to respond due to not knowing what the attacks are of even how to properly use the tools at their disposal.
Purple team exercises come in to improve these aspects by having one or several red team operators work with the blue team by simulating the latest attacks to ensure that the SOC receives the appropriate information and telemetry to detect them and respond appropriately. This helps the blue team recognize and prioritize important alerts as well as generally improve the security posture of the company by updating the insecure configurations.