Adversary emulation vs. vulnerability testing

Red teaming has different flavours depending on objectives.

Adversary emulation

Purpose: Simulate specific threat actors relevant to your organisation.

Approach: Research real adversary TTPs from threat intelligence. Replicate their tools, techniques, targeting, and operational patterns. Test whether defences detect and stop those specific adversaries.

Example: If APT29 targets your sector, emulate their preference for Living-off-the-Land techniques, their credential theft methods, their command and control protocols.

Value: Validates defences against realistic, known threats. Prioritises defensive improvements based on actual adversary behaviour.

Assumed breach

Purpose: Test detection and response after initial compromise.

Approach: Start exercise with access already granted (simulated phishing success, provided credentials, physical access). Focus on post-exploitation, lateral movement, and detection capabilities.

Value: Tests blue team’s ability to detect attackers already inside. Validates monitoring, alerting, and response procedures.

Full-scope red teaming

Purpose: Test entire defensive programme from reconnaissance through impact.

Approach: No holds barred (within rules of engagement). Use any ethical and legal technique to achieve objectives. Includes social engineering, physical access, supply chain attacks.

Value: Most realistic test of organisational resilience. Reveals unexpected attack paths and cascading failures.

Focused technical testing

Purpose: Test specific defensive controls or technologies.

Approach: Constrained scope focusing on particular systems, controls, or detection capabilities. Might test EDR effectiveness, network segmentation, privileged access controls.

Value: Provides detailed feedback on specific security investments. Validates vendor claims and configuration effectiveness.