As a twenty-plus year cybersecurity professional I can count on a single hand the times I had to respond to a vendor who made crazy, unsubstantiated claims. As practitioner in Breach and Attack Simulation (BAS) and Purple Teaming, I wanted to counter some really misleading “marketecture” that I heard another vendor make. I am going to take the high road and not call that vendor out by name and set the record straight by giving my experience with specifically the Cymulate Continuous Security Validation Platform that includes BAS and Purple Teaming solution.
BAS is using real world exploits and techniques along the entire kill chain to test enterprise environments real security controls, environments, and people. By doing such you get the most accurate picture of how the enterprise would respond to a real attack. Starting with reconnaissance these solutions moving onto mail, web, application reverse proxying and spear fishing techniques. Then it moves through endpoint, escalation, and lateral movement. Ending in data exfiltration. All along the way results come from the enterprises’ real security control interactions with the attacks and follow the entire kill chain from beginning to end and include pre-, during and post-execution. These solutions can be set up to run in a continuous security validation fashion where the results are more than scores but are also trends over time. This is how you assess how changes to your environment, vulnerabilities and new threats effect your enterprise. This prevents lateral drift and includes almost daily updates by our researchers with the latest threat intelligence information, attacks and behaviors. It also by design comes with very prescriptive remediation information that can be used to fix any gaps that are found. It also comes with executive level reporting so that the business decision-makers can clearly understand, measure and explain risk as well as to see the value they are getting out of their existing security controls and processes. These same BAS techniques that can be run in a continuous security validation fashion can be used and further customized by red and blue teams for purple teaming exercises. BAS is used to validate and optimize existing and new security controls, incident response plans and to help shore-up the skill set of your individuals. For the business decision-maker, there is a clear-cut capability to see the value of one’s security spend, to quantify, measure and convey risk.
We have seen people extol the concept of using emulation solutions and that somehow this is better than BAS. In emulation, real attacks are run in isolated environments on vendor not enterprise-controlled instances. These emulations are resource intensive to configure and maintain and are not the real enterprise environment they portend. They may also be restricted by limitations run by the vendor. It means you have no real idea if your real security controls, environment and instances are configured correctly and how they would truly respond. The importance of BAS is it is run in the real environment with real attack simulations and actual results. This allows to be automated, fast, comprehensive with accessible results. Also, if a customer wants emulated versus real environment it is possible to set up with BAS by using any virtualization and isolation technology already in use by the organization. This also means you are using a virtualization and isolation technology you and your staff are already familiar with and do not have any vendor-imposed restrictions. A robust BAS solution has no need for this. The scenario (AKA the attack simulations) themselves are restricted in a way they do not hurt anything. They are very much real attacks, simply constrained to avoid disruptions. Cymulate can show the veracity of our attacks proving that they are identical to techniques used by threat actors.
To be the most comprehensive and effective, BAS does four things very well.
One of the biggest things a BAS vendor like us provide is a dedicated research team and white hackers providing often daily updates on real world, current TTPs. It is the only way enterprises can clearly see if they are vulnerable to these real-world attacks, capabilities, and techniques. Clearly explained, mapped to the MITRE ATT&CK® framework, and run, the module provides the broadest coverage, chaining various actor techniques to safely target the various attack vectors from email, web, endpoint, and other vectors. The attacks include all the steps and variations comprehensively tested. Beyond this there are times where our research team finds new ways to deliver or execute techniques seen in the wild and in some cases even brand-new vulnerabilities and exploit techniques unrelated to anything seen before.
Just as attackers and their attacks change daily, so do enterprises. With a single playbook and a few mouse clicks Cymulate platform can push out thousands of new images, configurations, and even whole new environments with a click. Thousands of vulnerabilities are discovered daily, third parties as a service or in other ways tie into our enterprises. It is the reason as seen in our 2020 Yearly Cymulate Usage Report showed that all Cymulate customers ran simulations daily. It is a critical capability. Adding our inclusion of prescriptive, technical and executive reports our customers’ security controls, incident response plans and people are optimized. Risk is lowered and they are more secure.
As I said earlier, I wrote this in the context of my experience with Cymulate BAS. We have spent a lot of time working on the platform to make it as comprehensive yet simple to use as possible. The fact we cover the entire kill chain, include pre-, during and post-exploit, include reconnaissance, lateral movement, anti-phishing campaigns and are so integrated into thousands of security controls, run in a continuous security validation perspective, and even include automated purple teaming sets us apart from most.
I hope you have found this blog constructive and insightful. I do not swipe at other vendors but tells you what I know and hope you will do your due diligence and homework to accurately get a full picture of the terrain.
Start simulating cyber attacks today with a 14-day free trial of Cymulate's Continuous Security Validation Platform.
Dave Klein is the Director of Cyber Evangelism for Cymulate. With more than 21 years of real-world cybersecurity experience, he works with Cymulate teams, customers and industry thought leaders to address the challenges of securing modern enterprise environments. Dave’s long career includes working on the NIST response to President Obama’s Policy Directive 21 on Critical Infrastructure Security and Resilience, leading some of the largest sales engagements for US Federal security solutions, and working with the City of New York post 9/11, helping shore up cyber defenses.