Testing Your Defenses
Assume Breach Exercise Helps Identify Vulnerabilities and Improve Cybersecurity Posture
An Assume Breach test aims to simulate a cyber-attack on The Customer’s systems and defenses. The goal is to identify potential vulnerabilities and weaknesses in The Customer’s security posture.
By simulating a cyber-attack, The Customer can better understand where their defenses are strong and where they need to be improved. This can help the Customer prioritize their security efforts and make the necessary investments to strengthen their defenses.
CSIS can combine key elements of a simulated cyber-attack and build a test that reflects the risk appetite, the budget, and the compliance requirements of The Customer.
How it works
Discover how vulnerable your most critical assets are to cyber attacks.
We do this by introducing a “Patient Zero” PC to the customer’s network. Once the PZ is given power and wired internet, it will act as an infected PC and will be used to gather intel from the customer’s network.
When we have gathered sufficient intel, which usually takes 2-4 weeks, we will initiate a range of simulated attacks, documenting how we compromise the network along the way.
All findings and actionable recommendations for mitigations are then shared with the customer in the form of a report.
We can either do it as an ad-hoc “see how far we get” exercise or go specifically after up to three targets pre-defined by the customer (e.g., compromising the Active Directory, the organization’s ERP system, or even the CTO’s email).
Improve your cyber security posture
Penetration tests may include, but are not limited to:
- Exposing insufficient network protection
- Use of weak user credentials
- Exploitation of vulnerabilities in embedded devices
- Try to gain domain admin credentials
- Extraction of data
We can model the test to reflect your risk appetite, budget, and customer compliance requirements.
You have the option to expand the Assume Breach test with a range of add-ons.
The possible add-ons are:
- Advanced Purple Teaming, where we engage your SOC in a training workshop, that will ensure that it is - or will be - able to detect the tactics and techniques used in the exercise, supplemented with more than 30 simulated attacks, that cover the Cyber Attack Kill-Chain.
- Phishing Campaign, where we fire off two customized spear-phishing attacks against your company, to test the resilience of your end users.
- Physical Penetration test, where we try to gain physical access to your network by, among other things, sneaking, lock-picking, and swindling our way into the customer’s physical premises, and plant digital surveillance equipment.
- Password analysis, where we try to brute force your hashed AD passwords, report on the general sophistication level of the customer’s passwords and generalize end-user compliance with any given password policy.
- Intelligence Gathering, where we investigate what type of exploitable intel about your company and employees are available in the channels and repositories available to us.
Why should you conduct an Assume Breach Test?
An Assume Breach test lets you:
Identify weaknesses and vulnerabilities in the organization's security posture
Determine whether your critical assets and data are at risk.
Mitigate financial, operational, and reputational losses caused by cyber-attacks.
Identify cyber security weaknesses before an attacker exploits them
"A CSIS penetration test will improve your security posture by identifying security weaknesses before a real attacker can exploit them."
See us in action.
Request a Call
We are the leader in actionable and intelligence-driven detection and response services.