Unrivalled Expertise: Cyber Alchemy is formed of consultants with diverse professional backgrounds. Having team members coming from incident response and development backgrounds allows the team to think around problems or develop new tools to solve the issue, being able to mimic even the most motivated adversary. Uniquely for a purple team exercise, Cyber Alchemy are also able to leverage our consultant’s experiences as cyber security trainers when explaining how exploitation was achieved and what improvements can be made to prevent it from happening again. Purple team exercises are, above all, about learning, so when an adversary strikes, an organisation has the people, tools and processes to stop them.
Customised Approach: We understand that every organisation is unique. Our Purple Team Assessment service is tailored to your specific needs, industry regulations, and risk profile. We develop a value-oriented approach, incorporating custom attack scenarios that mimic the threats most relevant to your business, ensuring targeted and effective testing.
Comprehensive Security Testing: Our Purple Team Assessments cover a wide range of security aspects, including network infrastructure, web applications, wireless networks, social engineering, and physical security. We leave no stone unturned in assessing your overall security posture.
Collaboration and Knowledge Transfer: We believe in fostering collaboration throughout the assessment process. Our Purple Team works closely with your internal security team, sharing knowledge, best practices, and recommendations after the enagement. This empowers your team to understand the attack vectors better and strengthen your defences.
Actionable Recommendations: Our Purple Team Assessment doesn’t stop at identifying vulnerabilities. We provide you with actionable recommendations and practical remediation strategies to help you prioritise and address the identified weaknesses. Our focus is on helping you improve your security posture over the months that follow the assessment. .
Red Team exercises are designed to simulate a real-world attack on an organisation and to identify and exploit vulnerabilities, potentially covering physical, electronic, and social attacks. While no one can predict every possible attack, Purple Team Exercises help organisations test their readiness and simulate the next likely threat. These exercises give organisations a real taste of what a targeted attack and data breach feel like, thereby giving a bigger picture of your organisation’s risk posture, security architecture, and your team’s readiness to proactively detect and mitigate the threat. This can profoundly impact organisational security and security culture, highlighting areas for improvement and giving individuals first-hand experiences with a “breach”.
Most organisations are only as strong as their weakest link. Purple team exercises allow organisations to test the effectiveness of their network security and identify weaknesses and vulnerabilities in their existing policies, processes, technologies and personnel. Cyber Alchemy frequently works with organisations that have invested thousands in security tooling to keep them protected but often lack the required parallel investments in people and processes to maximise the value of these investments.
The outputs from a purple team exercise give organisations actionable data to evolve their security strategy based on the organisation’s unique weaknesses and vulnerabilities. They help identify and fix all identified security weaknesses and processes. Post-exercise reporting is important to document the how, what, and where and to improve processes and business defences for the future. Through this process, it is also possible to improve response time should a real-world attack occur.
Cyber Alchemy builds every purple team engagement bespoke. Every engagement has different objectives and needs to assess different capabilities. Cyber Alchemy maps all of its Purple Team exercises to the MITRE ATT&CK framework, which is a knowledge base of adversary tactics and techniques based on real-world observations. This approach has several benefits:
We will work with you to determine your objectives for the exercise and what defences you require testing with which tools, techniques and tactics. Our team will assist throughout this process, bringing their real-world experience to develop an engagement plan.
Should reconnaissance be a part of the agreed techniques, which we often recommend, our team will take an intelligence-led approach to gather information from public sources related to your organisation. This is used to determine appropriate attack scenarios for the exercise.
Keeping in constant communication with the blue team, we will attempt to penetrate your network and deliver the objectives defined in the scoping stage. This could include securely exfiltrating data from the systems that hold the target information selected by you. This, for example, would assess your security controls to detect and prevent loss of information as part of this exercise.
Throughout the engagement, we record which systems and tools are used or accounts created to achieve access. Where authorised changes to systems have been made, these will be reverted to the same state as if the engagement never happened, guaranteeing a seamless transition back to normality
Our Purple Team Exercise report will provide a detailed and digestible view of the critical, high-, medium- and low-priority risks and appropriate prioritised recommendations for your organisation. A matrix based on MITRE ATT&CK is also provided, giving a clear visual interpretation of what attacks were performed and where gaps were found. These outputs can be expanded into a defined security strategy as part of a further engagement with Cyber Alchemy, helping the organisation maximise the value of further security investments.
For organisations requiring in-depth and continuing remediation, every engagement has the opportunity to use our Full Stop Remediation™ service. Bespoke training delivered by our expert trainers covers the issues discovered in your systems and gives your system administration team the skills to ensure the same issues don’t creep back into your infrastructure. Full details of our reporting and Full Stop Remediation™ can be found below.
We don’t believe that report delivery marks the end of the engagement; in fact, it’s just the beginning for us. We’re in every client relationship for the long haul, providing ongoing support to ensure that issues are robustly addressed in line with your organisation’s requirements.
After every engagement, we offer a focused meeting to discuss the testing and outcomes. This allows system administrators and risk owners the opportunity to ask specific questions to our expert consultants, ensuring all parties understand the context of the vulnerabilities, alongside the likelihood and impact of successful exploitation.
We recognise that remediation of all issues doesn’t just happen overnight, and our technical team will be happy to answer any questions while remediation is happening over the following months. We find this approach allows for better integration of security into development and helps reduce the number of issues we see when retesting.
For clients who require further support, we offer our Full Stop Remediation™ post assessment training, which incorporates real-world examples from the assessment into the training course. This tailored approach delivers lessons to system administrators in a familiar context and environment, allowing the lessons learned to be immediately applied to existing projects and ensures long-term risk reduction. More information about Full Stop Remediation™ can be found below.
From the results of a penetration test, or series of assessments, our consultants can provide bespoke training to system administrators on how to remediate the issues found in the assessment and SecOps best practices. This powerful remediation offering allows total remediation for now and the future, giving infrastructure teams the skills to identify vulnerabilities before they make it to production. Other benefits of this remediation package include the following:
Contact us today for more information on how Full Stop Remediation™ can accelerate your SecOps program and put security at the heart of your infrastructure administration team.
To access your exclusive guide today, fill in the form below.