Listing Thumbnail

    Red Team Exercise

     Info
    With today’s ever-evolving threat landscape, sophisticated attacks can bypass conventional defenses and go unnoticed. Advanced adversaries could exploit hidden vulnerabilities and procedural gaps, eventually compromising your critical assets and sensitive data from within. When conducting Red Team Operations, our team of experts emulates the advanced tactics, techniques, and procedures (TTPs) of real-world, sophisticated threat actors. These immersive assessments are impact-driven, focusing on simulating high-consequence scenarios that test your organization’s ability to detect, respond to, and recover from complex threats, including those that may be entirely new to your environment.

    Overview

    Overview

    KirkpatrickPrice methodologies are unique and efficient because they do not rely on static techniques and assessment methods. Effective ethical hacking services require a diligent effort to find enterprise weaknesses, just like a malicious individual would. KirkpatrickPrice is your security partner. We are committed to working with your staff to ensure effective information security practices across your environment. Our security assessment methodology is derived from various sources including the Open Source Security Testing Methodology Manual (OSSTMM), Penetration Testing Execution Standard (PTES), Information Systems Audit Standards, CERT/CC®, the SANS® Institute, National Institutes of Standards and Technology (NIST), and the Open Web Application Security Project (OWASP). The primary objective of our security assessment methodology is to clearly and effectively communicate with you both throughout the project and about our observations. It is our belief that this will enable the most accurate and efficient results because information security services are dynamic in nature. Discovery and comprehensive testing of the ongoing findings will be a mutual collaboration that is relevant to your specific AWS environment. Our experts hold AWS certifications such as Certified Cloud Practitioner, Solution Architect, and the Security Specialization.

    Methodology

    KirkpatrickPrice will use open source, proprietary tools, and methodologies used by “hackers” and security auditors to conduct the external vulnerability assessment and penetration test, with the exception of those tools and techniques that are known by KirkpatrickPrice to cause denial of service. KirkpatrickPrice will emulate the tactics used by an outside attacker whose goal is to attempt to breach the security of your network and computer systems, including your AWS Cloud environment. The Red Team Exercise methodology allows for both automated and manual testing effort. This service level takes an in-depth look at the systems and networks that are in scope for testing. Vulnerabilities identified from automated effort are exploited for confirmation, but additional effort is spent on post-exploitation activities (where possible) to identify and demonstrate how the initial attack could lead to further compromise if leveraged by a real attacker. Additional manual effort is spent on reconnaissance, discovery, and exploitation of vulnerabilities that are not easily captured by a vulnerability assessment. Examples of this include but are not limited to sniffing and interacting with broadcast network traffic, Man-in-the-Middle attacks, and password attacks. The assessment will occur in seven phases:

    Phase 1 Objectives Definition Workshop

    Activities in this phase include:

    • Review current business context
    • Document critical business process and assets
    • Review AWS environment and associated tools (EC2, CloudTrail, etc)
    • Review the threat landscape
    • Define red team objective(s)
    • Define approach - External or assumed breach

    Phase 2 Recon & Threat Management

    Activities in this phase include:

    • Conduct target organization research
    • Research and model relevant threats
    • Research likely threats and TTP's that align with engagement objectives
    • Prepare TTPs for use during engagement

    Phase 3 Initial Access

    Leverage identified data and vulnerabilities to exploit systems or people to gain initial access.

    Phase 4 Establish Persistence

    Once the initial foothold has been established, actions will be taken to maintain access.

    Phase 5 Escalation/Lateral Movement

    Escalate privileges and move laterally using defense evasion techniques within the organization to achieve the defined objectives.

    Phase 6 Data Exfiltration

    Discover, collect, and exfiltrate target data

    Phase 7 Reporting & Debrief

    Present a detailed report of the findings, which includes executive report, red team findings, control success and failures, and recommendations for improvement.

    Highlights

    • KirkpatrickPrice has issued over 20,000 reports to 2,000 clients worldwide, giving them the assurance they deserve. By conducting every audit engagement with thorough, quality testing, KirkpatrickPrice delivers reports with results you can trust.
    • KirkpatrickPrice auditors have an average of 25+ years of experience and have worked in the field as CTOs, CISOs, CSOs, and more. They truly understand how hard an audit can be, and what makes them a valuable, worthwhile experience. Additionally, our refined audit delivery processes have been developed over 18 years to include SMEs, Client Success Managers, and Professional Report Writers.
    • The Online Audit Manager, the world’s first compliance platform, simplifies and streamlines your audit process by allowing you to prepare for and successfully complete an audit all in one place. The platform was developed by CPAs to help manage the audit process and connect you directly to an auditor throughout your compliance journey.

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. To get a custom quote for your needs, request a private offer.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Support

    Vendor support

    When you work with KirkpatrickPrice on any of your compliance efforts, you’re gaining a partner who truly cares about helping you achieve your security and compliance goals. You’ll work with an expert auditor, but you’ll also partner with a team of experts dedicated to your success. Your audit engagement team includes a Client Success Manager, Professional Writer, Information Security Associate, and of course an experienced Information Security Auditor.

    Additionally, the Online Audit Manager connects you directly to an information security expert who will work alongside you in the platform. You are able to instantly initiate a live chat with an expert whenever a question arises that you need a quick answer to.

    For support request, connect with one of our experts by calling 800-770-2791 or visiting our website