Listing Thumbnail

    DXC Strikeforce: Red Team Operation

     Info
    A goal‑driven Red Team exercise that emulates real-world adversaries to test your organization’s ability to prevent, detect, and respond to sophisticated attacks. Attack scenarios are tailored to your threat landscape and pursue business-relevant objectives including privilege escalation in the corporate directory, data exfiltration from critical systems or even ransomware deployment. The resulting report delivers actionable insights about the operational maturity of defenses against a realistic threat actor.

    Overview

    A Red Team Operation is an advanced security assessment that goes beyond traditional penetration testing. Delivered by DXC Strikeforce, it simulates real-world Tactics, Techniques, and Procedures (TTPs) used by threat actors targeting the client’s assets. The goal is to gain access, reach agreed objectives, and measure detection and response capabilities.

    Objectives • Identify and prioritize weaknesses in people, processes, and technology. • Assess detection and response effectiveness. • Improve Mean Time to Detect (MTD) and Mean Time to Respond (MTR).

    Phases of a Red Team Operation

    1. Scoping DXC Strikeforce meets with the client to define: • Objectives and attack scenarios. • Excluded IPs, domains, and networks. • Start date, communication protocol, and authorization for on-site activities.

    2. Technical Preparation Includes: • Intelligence gathering on client and relevant threat actors. • Identifying recent APT tactics for the client’s industry. • Setting up red team infrastructure. • Final agreement on execution.

    3. Attack Simulation Simulates a realistic kill chain: 1. Reconnaissance – Map external exposure and identify access paths. 2. Infiltration – Gain foothold, establish C2, and persistence. 3. Lateral Movement – Escalate privileges and reach objectives. 4. Impact – Demonstrate consequences (e.g., data exfiltration). 5. Cleanup – Remove artifacts and provide restoration instructions. Attack paths are documented and approved before execution. Techniques are mapped to MITRE ATT&CK for gap analysis.

    Customer Communication • Continuous updates to trusted agents. • Approval required for major impactful actions. • Immediate notification of critical vulnerabilities.

    Reporting Final report includes: • Executive summary. • Attack scenarios and outcomes. • Detection and response metrics (MTD/MTR). • Vulnerabilities and misconfigurations. • MITRE ATT&CK mapping and heatmap. A review meeting follows, with optional SOC/Blue Team recap for technical details.

    Key Benifits • Validate your ability to prevent, detect, and respond to realistic, end‑to‑end attack chains. • Identify exploitable weaknesses across people, processes, and technology, not just point vulnerabilities. • Quantify detection and response performance (MTD/MTR) and highlight telemetry gaps for engineering. • Executive and technical reporting, including ATT&CK heat map and prioritized remediation plan.

    AWS Service Used EC2, S3, IAM, EKS, ECS, Lambda, Amazon Audit Manager

    Highlights

    • • Validate your ability to prevent, detect, and respond to realistic, end‑to‑end attack chains. • Identify exploitable weaknesses across people, processes, and technology, not just point vulnerabilities.
    • • Quantify detection and response performance (MTD/MTR) and highlight telemetry gaps for engineering.
    • • Executive and technical reporting, including ATT&CK heat map and prioritized remediation plan.

    Details

    Delivery method

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    standard tier support -