Why your red team should not be special Well it should be special but not that special @isaiahsarju
A presentation at ShowMeCon 2019 in July 2019 in St. Louis, MO, USA by Isaiah Sarju
 
                Why your red team should not be special Well it should be special but not that special @isaiahsarju
 
                 Security consultant, co-owner Revis Solutions  Red teamer Me  Teacher  Anti: nihilism, security theater, wasted time  Pro: risk based security  Loves islay whiskey @isaiahsarju
 
                 It’s not for everyone Why you should have a red team  Need more than a pentest  Challenge SOC/blue team  Fine tune processes, decrease response time  There are APTs in your threat model  Justify security decisions with evidence @isaiahsarju
 
                 Dislike using corporate.* Red teams want to be special  Manage own infrastructure  Avoid oversight/accountability  Believe they are un-hackable  Think rules don’t apply to them @isaiahsarju
 
                 Naughty AWS Activity Scare Stories  Lazy P3nt35t3r5  What’s yours? @isaiahsarju
 
                Why your red team should not be special  Shadow IT  Hackers can get hacked  Lack of empathy @isaiahsarju
 
                What testing is right for us? Red team maturity model What should drive testing? Organizational preparedness? Threats in threat model? @isaiahsarju
 
                 This happens when red teams manage their own infrastructure  Testing infrastructure  Configuration drift  Red teams aren’t IT departments Shadow IT  Red teams can’t        Test And help with remediation And hone skills And build new infrastructure And maintain infrastructure And do security monitoring And … @isaiahsarju
 
                Hackers can get hacked  This happens because hackers ≠ good defenders  Are they testing or are they hacked?  Mentality @isaiahsarju
 
                 This happens because hackers can be condescending  “Just do _____” Lack of empathy  Corporate assets are cumbersome  Balance security with usability  Don’t understand how hard processes are to follow  Red teams need to take their own medicine @isaiahsarju
 
                What’s NOT the answer?  “Here’s a laptop just like everyone else. Go forth and test”  Give them a nice MacBook and say “show me me your worst”  Ugh. Security is expensive. Goat sacrifices and crossed fingers are cheaper @isaiahsarju
 
                General A good approach • • • • Have red teams lead by example Plan for exceptions Keep data on “internal” infrastructure Allow current risk owners to keep owning risk Technical • Institute principle of least common mechanism • Mediate data transfer • Apply principle of least privilege policies @isaiahsarju
 
                General A good outcome • • • • Understand infrastructure/policies/procedures Grow together as a red/blue team Offload risk to current risk owners Build relationships that are necessary down the road Technical • Implement defense-in-depth • Log, monitor, and differentiate between activity • Allow red team to focus on what they do best @isaiahsarju
 
                Red team maturity model Third Party Penetration Testing Continuous Third Party Penetration Testing Internal Penetration Testing Team Internal Red Team @isaiahsarju Internal Adversary Simulations (APT)
 
                Infrastructure Red team maturity model indicators IR capabilities Organizational posture IT support capabilities Threat Intel Operator skill sets SOC capabilities Types of testing @isaiahsarju
 
                Third Party Penetration Testing N/A Continuous Third Party Penetration Testing Function of IT RTMM SOC capabilities Unformalized, ad-hoc “Know who to call” Internal Penetration Testing Team Centralized Logging and SIEM Fair organizational detection coverage Single indicator based detection Build sophistication through testing findingse Self-directed Internal Red Team Fair organizational detection coverage Centralized Logging and SIEM Coordinated playbooks Build sophistication through testing findings Self-directed Complex correlation Internal Adversary Simulations (APT) Significant organizational coverage Centralized Logging and SIEM Coordinated playbooks Build sophistication through testing findings Self-directed Complex correlation Behavioral detection @isaiahsarju Testing team has own detection and monitoring team
 
                Third Party Penetration Testing Scanning Overt (loud and fast) Continuous Third Party Penetration Testing Scanning RTMM types of testing Overt (loud and fast) General pentests Internal Penetration Testing Team Overt (loud and fast) Focused pentests General pentests Social Engineering Avoided Request based Physical testing Internal Red Team Exercises informed by threat intel Focused pentests Request based Self-guided Direct by threat intel Social engineering Internal Adversary Simulations (APT) Directed by threat intel APT Simulation @isaiahsarju APT Simulation
 
                Folks Why tie RTMM to staff preparedness vs actual threats? Aren’t Ready @isaiahsarju
 
                 May be unpopular. Especially with operators Wrap this up  Red teams need to take a dose their own medicine  Red teams can lead by example and build positive relationships  Future Research: “Map” RTMM to ATT&CK @isaiahsarju
 
                Info  @isaiahsarju all over The Internet  https://github.com/isaiahsarju/presentations @isaiahsarju
 
                Questions? @isaiahsarju
