A Red Team Service starts with a conversation between you and SecureState. This is to ensure both parties are on the same page and to identify the specific trophies for the engagement.
After the preliminary information is obtained, SecureState develops an operational plan, detailing multiple scenarios, all leveraging threat-representative, blended attacks. These blended attacks leverage vulnerabilities that span multiple Security Domains, making them often overlooked in traditional security assessments. At this point, SecureState will execute the plan of attack and make continuous adjustments until the trophies are compromised.
The final deliverable for this engagement is an extremely detailed report which explains all of the steps leading up to the trophy compromise. SecureState provides remediation steps for specific vulnerabilities, as well as mitigation strategies for any difficult, non-traditional problems identified during the assessment. Finally, a detailed breakdown of each of the three Security Domains is included for the purpose of providing actionable data designed to help shape your remediation timeline.