Overview
A Red Team Operation is an advanced security assessment that goes beyond traditional penetration testing. Delivered by DXC Strikeforce, it simulates real-world Tactics, Techniques, and Procedures (TTPs) used by threat actors targeting the client’s assets. The goal is to gain access, reach agreed objectives, and measure detection and response capabilities.
Objectives • Identify and prioritize weaknesses in people, processes, and technology. • Assess detection and response effectiveness. • Improve Mean Time to Detect (MTD) and Mean Time to Respond (MTR).
Phases of a Red Team Operation
1. Scoping DXC Strikeforce meets with the client to define: • Objectives and attack scenarios. • Excluded IPs, domains, and networks. • Start date, communication protocol, and authorization for on-site activities.
2. Technical Preparation Includes: • Intelligence gathering on client and relevant threat actors. • Identifying recent APT tactics for the client’s industry. • Setting up red team infrastructure. • Final agreement on execution.
3. Attack Simulation Simulates a realistic kill chain: 1. Reconnaissance – Map external exposure and identify access paths. 2. Infiltration – Gain foothold, establish C2, and persistence. 3. Lateral Movement – Escalate privileges and reach objectives. 4. Impact – Demonstrate consequences (e.g., data exfiltration). 5. Cleanup – Remove artifacts and provide restoration instructions. Attack paths are documented and approved before execution. Techniques are mapped to MITRE ATT&CK for gap analysis.
Customer Communication • Continuous updates to trusted agents. • Approval required for major impactful actions. • Immediate notification of critical vulnerabilities.
Reporting Final report includes: • Executive summary. • Attack scenarios and outcomes. • Detection and response metrics (MTD/MTR). • Vulnerabilities and misconfigurations. • MITRE ATT&CK mapping and heatmap. A review meeting follows, with optional SOC/Blue Team recap for technical details.
Key Benifits • Validate your ability to prevent, detect, and respond to realistic, end‑to‑end attack chains. • Identify exploitable weaknesses across people, processes, and technology, not just point vulnerabilities. • Quantify detection and response performance (MTD/MTR) and highlight telemetry gaps for engineering. • Executive and technical reporting, including ATT&CK heat map and prioritized remediation plan.
AWS Service Used EC2, S3, IAM, EKS, ECS, Lambda, Amazon Audit Manager
Highlights
- • Validate your ability to prevent, detect, and respond to realistic, end‑to‑end attack chains. • Identify exploitable weaknesses across people, processes, and technology, not just point vulnerabilities.
- • Quantify detection and response performance (MTD/MTR) and highlight telemetry gaps for engineering.
- • Executive and technical reporting, including ATT&CK heat map and prioritized remediation plan.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Pricing
Custom pricing options
How can we make this page better?
Legal
Content disclaimer
Support
Vendor support
standard tier support -