document.body.classList.toggle('menu-open', show); // Add 'menu-open' class to body.

Run a Purple Team operation for FREE

th4ts3cur1ty.company - Meet The Team - Eliza
Written by Eliza-May Austin
December 4, 2020
Tags – ,

How to run a Purple Team operation for free

Run a Purple Team operation for FREE to enhance your cybersecurity defences without incurring additional costs. This guide provides step-by-step instructions on leveraging available resources to conduct effective purple teaming exercises. By integrating red and blue team strategies, you can identify vulnerabilities and strengthen your security posture. Discover how to optimise your cybersecurity efforts and protect your digital assets through cost-effective purple teaming.

What is Purple Teaming?

Purple Teaming is a glossy phrase given to the action of getting your blue (Cyber defence) and red team (offence/pen-test) to work together. They are, after all, working toward the same goal, securing the same infrastructure.

A Red team’s purpose is to feed information back to the company upon completion of testing, so the company can implement mitigation. I am yet to see this information exchange done efficiently enough to provide any measurable improvements.The cyber defence capability (usually a SOC) often isn’t made aware of testing in advance, and doesn’t have the opportunity to report back on what they could and could not defend against. Simply alerting on a SIEM is a fire alarm with no extinguisher. On the occasion the defensive team is made aware, they often have to continue with the “normal” amount of work, plus known internal testing, so the testing becomes deprioritised to the SOC in favour of BAU.

Reasons why alerts may not be seen in the monitoring tool sets are often not investigated. Besides pushing out patches and AV signature updates, you’ll find little is done as a reaction to the lack of visibility by the SOC, and the successes of the offensive team. Little consideration is given to the placement of the attack, the stages where the offensive team was successful or at which points the defensive team was successful. This really matters. We need to know what we’re doing well and where we’re doing a shoddy job so that we can improve.

Most companies of scale have undertaken penetration testing and/or red team testing at some point. Commonly these tests are not run with an identified adversary in mind. Well funded and strong adversaries attack against specific systems, with the aim of uncovering attack vectors that connect to, or exist on, business-critical services or infrastructure to carry out specific actions and objectives.

It’s important to mimic known likely attackers rather than simply define a scope. There really is no point preparing the Navy to fight solely at sea if the enemy enter by air. As Sun Tzu pointed out in The Art of War, knowing your enemy is half the job. The lowest hanging fruit should be defended through automation and periodical testing to give your team the resources to really get themselves in to a combat ready state.

"You want to be Purple-Teaming if you feel that you aren’t getting the most out of your security teams. It’s literally the act of collaboration and peer to peer training."

Considering it’s often hard to get buy-in from stakeholders for potentially expensive contracts, an excellent place to start is with PurpleTeam meetings using existing employees. Bringing red and blues together to analyse the week’s successes of the offensive activities, and the failings of the defence capability.

A PurpleTeam approach works equally well with internal or external red and blue teams. If you normally use external pen-testers or if your SOC is managed by an MSSP, the approach will still yield the best results, but do make sure that you have covered your requirements for PurpleTeam activities in the contracts with your service providers.

Working in gamified environments is fun, believe me I’ve done it. But bashing each other over the head with the proverbial club isn’t the best way to incentivise your security teams performance. A few years ago it came to light that the red team during a particular war gaming exercise was not disclosing vulnerabilities to the blue team. The reason for this was that they were saving points to cash in later, all the while leaving vulnerabilities exposed.

So to give you a feel for how this works in practice……

Here’s one I made earlier:

Maybe you like the idea of running PurpleTeam operations but you don’t know how much they benefit the organisation or improve security. I would suggest first try running PurpleTeam meetings via creating a PurpleTeam process. Remember you aren’t creating a new team, rather defining a new way of working. Implementing this needn’t be as difficult as you’d expect, purple may be a mixture of red and blue, but Purple-Teaming should be black and white.

How to measure success in Purple Teaming

Keep track of your progression, below is a very simple way of doing so easily. This should lead to an improvement in Security KPIs and hopefully even close off some things on the company Risk Register (although if done well, you may find some risks you weren’t aware of before……).

Th4ts3cur1ty.company implements Purple-Teaming operations through a bespoke threat and infrastructure analysis program, but we appreciate that not everyone is in a position to hire external experts. Hopefully this article and check list will give some insight on how to run these operations for free and in turn improve the security culture of your organisation.

Let me know how you get on . . .

Learning how to run a Purple Team operation for FREE can significantly improve your organisation’s cybersecurity without added expenses. By combining red and blue team tactics, you can effectively identify and mitigate vulnerabilities. Implement these strategies to enhance your security measures and safeguard your digital assets at no extra cost.

Like what you see? Share with a friend!

th4ts3cur1ty.company - Meet The Team - Eliza

This article is written by

Eliza-May Austin

CEO

Eliza exudes a captivating, no-nonsense demeanour that defines the services provided by th4ts3cur1ty company. As a proud Yorkshire woman, she boasts an impressive expertise in tea, gravy, and local hiking trails. Clients value Eliza’s practical, assertive stance on security, especially in challenging situations. Quietly dubbed the “Winston Wolfe of cyber”, she navigates complex conditions with a calm and strategic approach. Trust her to handle security matters with finesse and to get you out of a bind with determined resolve.