August 16, 2023 By Evan Anderson 4 min read

It is not a matter of if an organization will be compromised, but when. An adept, well-resourced and experienced attacker could very well be your worst cyberthreat nightmare. Fortunately, if your organization engages a red team, an ethical hacker could also be your best friend. 

Conducting red team testing is the most realistic way to validate your defenses, find vulnerabilities and improve your organization’s cybersecurity posture. A red team engagement gives your blue team a chance to more accurately assess your security program’s effectiveness and make improvements. It’s also how more organizations bring a resilience-first mindset into their cybersecurity posture.  

Find out about the benefits of red teaming, the differences between red and blue teams and what a purple team is in my previous blog post, “Red teaming 101: What is red teaming?” 

Why red teams are important in cybersecurity 

As part of security testing, red teams are security professionals who play the “bad guys” to test the organization’s defenses against blue team defenders.  

Every bit as skilled as real threat actors, red teams probe an attack surface for ways to gain access, get a foothold, move laterally and exfiltrate data. This approach contrasts with the methodology behind penetration testing (or pen testing), where the focus is on finding sensitive information or exploitable security vulnerabilities and testing cybersecurity defenses to gain access to security controls.  

Unlike cybercriminals, red teamers do not intend to cause actual damage. Instead, their goal is to expose gaps in cybersecurity defenses, helping security teams learn and adjust their program before an actual attack happens.  

How red teaming builds resilience  

A famous quote states: “In theory, theory and practice are the same. In practice, they are not.” The best way to learn how to prevent and recover from cyberattacks is to practice by conducting red team activities. Otherwise, without proof of which security tactics are working, resources can easily be wasted on ineffective technologies and programs. 

It’s hard to tell what really works, what doesn’t, where you need to make additional investments and which investments weren’t worth it until you have the opportunity to engage with an adversary who is trying to beat you. 

During red team exercises, organizations pit their security controls, defenses, practices and internal stakeholders against a dedicated adversary that mounts an attack simulation. This is the real value of red team assessments. They give security leaders a true-to-life appraisal of their organization’s cybersecurity and insight into how hackers might exploit different security vulnerabilities. After all, you don’t get to ask a nation-state attacker what you missed or what they did that worked really well, so it’s hard for you to get the feedback you need to actually assess the program. 

Moreover, every red team operation creates an opportunity for measurement and improvement. It’s possible to gain a high-level picture of whether an investment—such as security tools, testers or awareness training—is helping in the mitigation of various security threats.  

Red team members also help companies evolve beyond a find-and-fix mentality to a categorical defense mentality. Turning attackers loose on your network security can be scary — but the hackers are already trying every door handle in your security infrastructure. Your best bet is to find the unlocked doors before they do.  

When to engage a red team  

It’s said that there are only two types of companies—those that have been hacked and those that will be hacked. Regrettably, it might not be far from the truth. Every company, no matter its size, can benefit from conducting a red teaming assessment. But for a red team engagement to provide the most benefit, an organization must have two things:  

  • Something to practice (a security program in place)  
  • Someone to practice it with (defenders)  

The best time for your organization to engage red team services is when you want to understand program-level questions. For example, how far would an attacker who wants to exfiltrate sensitive data get within my network before they trigger an alert?  

Red teaming is also a good option when your security team wants to test their incident response plan or train team members.  

When red teaming alone is not enough 

Red teaming is one of the best ways to test your organization’s security and its ability to withstand a potential attack. So, why don’t more companies opt for it?  

As beneficial as red teaming is, in today’s fast-paced, ever-changing environments, red team engagements can fall short of detecting break changes as they happen. A security program is only as effective as the last time it was validated, leading to gaps in visibility and a weakened risk posture.  

Building an internal red team capacity is expensive and few organizations are able to dedicate the necessary resources. To be truly impactful, a red team needs enough personnel to mimic the persistent and well-resourced threat level of modern cybercrime gangs and nation-state threats. A red team should include dedicated security operations members (or ethical hacking sub teams) for targeting, research, and attack exercises.  

A variety of third-party vendors exist to give organizations the option of contracting red team services. They range from large firms to boutique operators that specialize in particular industries or IT environments. While it is easier to contract red team services than to employ full-time staff, doing so can actually be more expensive, particularly if you do so regularly. As a result, only a small number of organizations use red teaming frequently enough to gain real insight. 

Benefits of continuous automated red teaming (CART) in cybersecurity 

Continuous automated red teaming (CART) utilizes automation to discover assets, prioritize discoveries and (once authorized) conduct real-world attacks utilizing tools and exploits developed and maintained by industry experts. 

With its focus on automation, CART allows you to focus on interesting and novel testing, freeing your teams from the repetitive and error-prone work that leads to frustration and ultimately burnout. 

CART provides you with the ability to proactively and continually assess your overall security posture at a fraction of the cost. It makes red teaming more accessible and provides you with up-to-the-minute visibility into your defense performance. 

Check out our video to learn more about continuous automated red teaming (CART)

Elevate your cybersecurity resilience with IBM Security Randori  

IBM Security® Randori offers a CART solution called IBM Security Randori Attack Targeted, which helps you clarify your cyber risk by proactively testing and validating your overall security program on an ongoing basis. 

The Total Economic Impact™ of IBM Security Randori study that IBM commissioned Forrester Consulting to conduct in 2023 found 75% labor savings from augmented red team activities. 

The solution’s functionality seamlessly integrates with or without an existing internal red team. Randori Attack Targeted also offers insights into the effectiveness of your defenses, making advanced security accessible even for mid-sized organizations. 

Learn more about IBM Security Randori Attack Targeted

Get started with IBM Security Randori

This blog post is part of the “All you need to know about red teaming” series by the IBM Security Randori team.

Was this article helpful?
YesNo

More from Cybersecurity

Data privacy examples

9 min read - An online retailer always gets users' explicit consent before sharing customer data with its partners. A navigation app anonymizes activity data before analyzing it for travel trends. A school asks parents to verify their identities before giving out student information. These are just some examples of how organizations support data privacy, the principle that people should have control of their personal data, including who can see it, who can collect it, and how it can be used. One cannot overstate…

How to prevent prompt injection attacks

8 min read - Large language models (LLMs) may be the biggest technological breakthrough of the decade. They are also vulnerable to prompt injections, a significant security flaw with no apparent fix. As generative AI applications become increasingly ingrained in enterprise IT environments, organizations must find ways to combat this pernicious cyberattack. While researchers have not yet found a way to completely prevent prompt injections, there are ways of mitigating the risk.  What are prompt injection attacks, and why are they a problem? Prompt…

IBM Tech Now: March 25, 2024

< 1 min read - ​Welcome IBM Tech Now, our video web series featuring the latest and greatest news and announcements in the world of technology. Make sure you subscribe to our YouTube channel to be notified every time a new IBM Tech Now video is published. IBM Tech Now: Episode 95 On this episode, we're covering the following topics: IBM X-Force Cyber Range Combating deepfakes Stay plugged in You can check out the IBM Blog Announcements for a full rundown of all news, announcements,…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters