In March 2016, US government confirmed the claims of a hacktivist group working for Iranian Revolutionary Guards. The group claimed to have gained access to Bowman Avenue Dam in Rye Brook, New York. The act was purposely done to undermine national security and markets of USA. Manhattan U.S Attorney Preet Bharara described these hacks as “frightening new frontier” of cyber crime that’s “scary to think about.” Similarly, in 2014, a group of hackers exploited loopholes in Supervisory Control and Data Acquisition(SCADA) and took full control of critical infrastructure.
As per a report by Gartner Inc, 6.4 billion connected things will be in use worldwide in 2016 with 5.5 million new things getting connected every day. Given the emergence of “Internet of Things” which includes a fully connected utility sector (electric, gas and water firms), cyber security has become extremely crucial and it’s importance will only increase with each passing day. In such a scenario, no professional cyber security team can choose to ignore the benefits of “Red Team vs Blue Team exercise”.
The basic idea is to identify loopholes in a system. When it comes to cyber security two groups of security professionals are formed. The Red team is entrusted with the task to attack the system while Blue team’s job is to prevent Red team from hacking into the system and taking control of it.
These exercises trace their origin to military. In military these exercises were performed to test the battle-readiness of a force. Even US intelligence (military and civilian) has Red team which explores alternative future and creates strategies from the viewpoint of foreign leaders. In addition to it sensitive sites like nuclear facilities also perform simulated exercises based on the same principle. In fact it was only in 1990s when these exercises were adopted by cyber security professionals to test information security systems.
Shift in Perspective is the major benefit which these exercises lead to. A red team is an independently thinking and operating group that challenges organizational thinking, perspective and systems by viewing it from an alternative and different perspective. The fantastic outcome is a better understanding of strengths and weaknesses from an unbiased view, enhance decision making, and avoid surprise. A Red team can be related to an ethical hacker, who hacks the system in order to test or evaluate the security rather than a malicious or a criminal intent. It’s always better to stand exposed in front of a friend rather than a foe. These exercises help in getting answers to various organizational questions like
It is essential to note that the benefits of Red Teaming depends on the kind of exercise being performed. The exercises vary from the basic Social Engineering to Cyber Attack Simulation and Penetration Efforts. Nowadays, even post assessment advice and implementation tips are being provided which cover all aspects of cyber security. Nevertheless, the benefits which most of the organizations can derive are:
Apart from these benefits, certain risks are also associated with such exercise which include the information and security results being in the hands of a third party which conducted the exercise. These issues can be legally taken care of before conducting the exercise. Nevertheless, the benefits of Red Teaming and Blue Teaming exercise makes it indispensable to cyber security.
Publisher