8.2. Red and blue confrontation¶
8.2.1. Concepts¶
The concept of red-blue confrontation originated from the American exercise in the 1960s. The exercise refers to the army conducting large-scale actual military exercises. The exercise is usually divided into the red army and the blue army. The blue army usually refers to the simulated confrontation exercise in the army. The troops that play the role of the imaginary enemy and conduct targeted training with the Red Army (representing our frontal troops), this method is also called Red Teaming.
This is where the concept of cybersecurity red-blue confrontation comes from. As the defender of the enterprise, the Red Army ensures the safety of the enterprise through security reinforcement, attack monitoring, emergency response and other means. As the attacker, the blue army aims to discover security loopholes and obtain business rights or data, and uses various attack methods to try to bypass the layers of protection of the red army and achieve the established goal. What may be confusing is that in Europe and the United States, the red team is generally used to represent the attacker, the blue team to represent the defender, and the colors represent the opposite.
8.2.2. Cyber Attack and Defense Exercises¶
The more influential exercises include “Locked Shields” and “Cyber Storm”. The “Lock Shield” is held annually by the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE). “Cyberstorm” is led by the U.S. Department of Homeland Security (DHS) and has been held every two years since 2006.
Compared with the APT attack, the offensive and defensive exercises are relatively short, only 1 to 4 weeks, and there is a defensive target. The APT attack target is unique, the duration can reach from several months to several years, and it is more stealthy.
8.2.3. Focus¶
The work content of the enterprise network blue army mainly includes penetration testing and red-blue confrontation. The technologies used in these two methods are basically the same, but the focus is different.
Penetration testing focuses on digging out more security vulnerabilities in a short period of time, and generally does not pay much attention to whether the attack behavior is detected by monitoring. The purpose is to help business systems expose and converge more risks.
The red-blue confrontation is closer to the real scene, and it is biased towards actual combat, and the scenes faced are complex and various technologies. Focus on bypassing the defense system and silently achieve the goal of obtaining business permissions or data. Do not seek to discover all the risk points, because the more attacking moves, the greater the probability of being discovered. Once discovered, the Red Army will kick the Blue Army out of the battlefield. The purpose of the red-blue confrontation is to test the defense-in-depth capability, alert operation quality, and emergency response capability in a real attack.
8.2.4. Objectives¶
Assess the effectiveness of existing defense capabilities, identify weaknesses in defense systems, and propose specific countermeasures
Use real and effective simulated attacks to evaluate the potential business impact caused by security issues, and provide effective data for security management to quantify the ROI of security investment
Improve company security maturity and its ability to detect and respond to attacks
8.2.5. Preliminary preparation¶
Organization Chart
Network topology
Logical structure diagram of each system
Calling relationship between systems
data flow relationship
- Asset sorting
List of core assets
business system assets
equipment assets
Outsourced/Third Party Service Assets
legacy assets
- business asset information
business system name
Type of business system
server type
Domain name/IP address
service port
Version
System deployment location
Development Framework
middleware
database
Responsible
Maintenance personnel
- Equipment Asset Information
device name
Device version number
Firmware version number
IP address
Deployment location
Responsible
Maintenance personnel
- Outsourced/Third Party Services Asset Information
Manufacturer contact information
system name
system type
IP/URL address
Deployment location
Responsible
Maintenance personnel
Manufacturer contact information
third-party on-duty staff
- Risk sorting
infrastructure risk
Sorting out account permissions
Internet Risk Check
Converging attack surface
emergency response plan
business continuity plan
Disaster Recovery Plan
8.2.6. Action Flow¶
- Attack preparation
Clarify the scope of authorization, test objectives, restrictions, etc.
Reporting and Authorization Process
Action Costs and Budgets
- Attack execution
within the time period of the record
within the target range of the filing
Recorded attack IP and network environment
- Attack done
restore all changes
remove all persistent controls
Submit attack reports and suggestions for improvement
8.2.7. Notes¶
report before the test
Communicate in advance when it may affect the operation of the business
Vulnerabilities and business communication are confirmed before issuing a work order to fix
Vulnerability closed loop