Purple team strategies enhancing global security posture through uniting red and blue teams with adversary emulation

Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniques Key Features Apply real-world strategies to strengthen the capabilities of your organization's security system...

Full description

Bibliographic Details
Other Authors: Routin, David, author (author), Thoores, Simon, author, Rossier, Samuel, author
Format: eBook
Language:Inglés
Published: Birmingham, England ; Mumbai : Packt [2022]
Edition:1st ed
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009669523106719
Table of Contents:
  • Table of Contents Contextualizing Threats and Today's Challenges Purple Teaming – a Generic Approach and a New Model Carrying Out Adversary Emulation with CTI Threat Management – Detecting, Hunting, and Preventing Red Team Infrastructure Blue Team – Collect Blue Team – Detect Blue Team – Correlate Purple Team Infrastructure Purple Teaming the ATT&CK Tactics Purple Teaming with BAS and Adversary Emulation PTX – Purple Teaming eXtended PTX – Automation and DevOps Approach Exercise Wrap-Up and KPIs.