Purple Team

Purple Team is an iterative, collaborative process of checking and improving cybersecurity measures through realistic, prioritized adversary emulation.

Purpose

Purple Team is a purpose-driven activity. Huge impact towards threat-informed improvements.

Highlight impact of Purple Team by asking “Where and how do we defend against threat x?”. Our goal will be to understand and improve these answers.

Idea: Find new vulnerabilities (the Red Team part). Opportunity to fix.

Planning

Use the MITRE Attack Navigator from the MITRE ATT&CK Framework.

Determine the Purple Team type

Purple Team Exercise: Purple Team Exercises are “hands-on keyboard” exercises where attendees work together with an open discussion about each attack technique and defense expectation to test, measure, and improve people, process, and technology in real-time.

Operationalized Purple Team: Red and Blue teams work together as a virtual team. When new TTPs are discovered, they are analyzed, discussed, and emulated to continually build and improve detection and response.

Dedicated Purple Team: Dedicated purple team roles. These roles vary from dedicated Purple Team Exercise Coordinators to engagement management of operationalized purple teams to the main stakeholders operating Breach and Attack Simulation solutions.

Prioritize threats

What threats are most important to us?

  • Applicable to your technology stack and your environment
  • High risk (likelihood x impact)
    • Commonly and/or recently used by relevant adversaries
    • Any known adversaries targeting your organisation or business sector?
    • What techniques do these adversaries use?
    • Impact key resources, assets and/or business functions, safety, privacy
  • Current defensive gap, what do we need to improve?
  • Choose techniques that would benefit from iteration with emulation
  • Focus: e.g. specific sub-techniques, techniques, campaign, or groups

Limitations

Realistically, we cannot test all attacks. And we may not want to, as some are not applicable.

Determine the defensive scope

Are we focused on mitigation, detection, investigation, or response actions?

Documentation

Documentation is a functional requirement of a purple team event.

Have a template to purple team successfully.

What did we execute?What did we expect?What did we actually see?
Clicked malicious payload (T1204.002)Untrusted macro execution should be blockedPrompt allowed user to bypass controls
Example of documentation

Emulation: document a playbook with tools to use (like which post-exploitation framework to use) and commands. It needs to be repeatable, and well-documented.

Infrastructure

  • Ensure that you have the infrastructure to test. Target machines up and running and configured correctly.
  • If done in production, ensure the proper written approvals from system owners.
  • Ensure you have all the accounts needed
  • Data sources and SIEM up and running
  • Queries and analytics working as expected

Scheduling

For Purple Team Exercises:

  • Establish Purple Team Event date and prep schedule
  • Invite emulators, defenders, facilitators to the event
  • Invite stakeholders to a post-event read-out

Execution

Operationalized Purple Team

The Red team executes the prepared playbooks. Document the execution date/time. Take screenshots.

The Blue team validates detection. Document.

Purple Team Exercise

Purple teaming is adaptable. Consider on-the-fly changes for red to adapt to blue, or vice versa. However, keep in mind the initial objectives.

Live cat-mouse game – may need to adjust difficulty or behavior in real-time. It the Blue Team struggles, give more information to the Blue team about the machine targeted, or exact timestamp.

Encourage collaboration and sharing. Share viewpoints and ways to circumvent each other. Everyone wins; it is NOT about one team stomping the other.

Follow Up

Purple Team Exercise

Follow-up actions to optimize benefit. Incorporate results into next purple team exercise.

  • Document what you uncovered during the purple team exercise:
    • Analytics that were developed, analytics that did not work so well
    • Vulnerabilities / weakness discovered
    • Defensive gaps discovered
    • Next steps and todos
  • Act:
    • Deploy identified mitigations
    • Update Response documentation / training / automation
  • Plan for the next Purple Team:
    • Update defensive posture assessment
    • Identify next priority gaps to fill
    • Consider making this a recurring event
    • Address feedback from participants