homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. Continuous Penetration Testing and the Rise of the Offensive SOC
Chris Dale 2025
Chris Dale

Continuous Penetration Testing and the Rise of the Offensive SOC

Penetration testing is evolving through two groundbreaking shifts: Attack Surface Management and Continuous Penetration Testing.

February 5, 2025

Penetration testing is evolving through two groundbreaking shifts: Attack Surface Management and Continuous Penetration Testing. Now, imagine a world where penetration testers operate continuously rather than during isolated periods—a world where the offensive team runs its own version of a Security Operations Center (SOC). But in this SOC, the alerts don’t signal potential breaches; they highlight new opportunities for penetration testing.

These approaches move beyond static checklists and annual assessments, enabling dynamic, real-time engagements. To support these advancements, I’ll share actionable methods organizations can adopt to boost their cyber resilience through offensive services like penetration testing. We’ll also delve into Offensive Security Operation Centers (Offensive SOCs), where Security Information and Event Management (SIEM) systems generate alerts—or opportunities—for penetration testers to act on.

Part 1: The Shortcomings of Traditional Pen Testing

Penetration testing is often used to determine if a business can be hacked or not, but its limitations are evident. Organizations struggle to define the scope of pen tests, often excluding unknown shadow IT and legacy systems that hackers are likely to exploit. Additionally, pen tests are typically conducted once a year, leaving gaps in security posture. The reactive nature of traditional testing doesn’t align with the agile, continuous innovation of modern businesses.

A Fundamental Problem – Scope

One of the core issues with penetration testing is scope. Attackers don’t care about the scope defined in a pen test, but penetration testers need to factor it in. Real attackers exploit what they find, whether it’s an overlooked DNS server or a forgotten user account. This mismatch between traditional pen testing and real-world threats underscores the need for a more dynamic approach to penetration testing, typically by continuously understanding the digital attack surface.

The Proposed Solution – Digital Footprint Reports

To address these gaps, I proposed starting with a Digital Footprint Overview many years ago. Instead of convincing my customers to buy a penetration test, I encouraged them to first consider a “no scope” overview. What could penetration testers find by just scanning and searching?

A digital footprint serves as a way for penetration testers to conduct reconnaissance, scanning, and attack surface discovery in advance of a possible penetration test. This approach allows testers to aim far and wide to identify assets, shadow IT, and general security hygiene across the environment. Reconnaissance is an integral part of penetration testing, but unfortunately an art long forgotten by many penetration testing companies today.

This process involves mapping all external-facing assets, including social media accounts, leaked credentials, shadow IT, third-party providers, open network services/ports, and much more. By gaining visibility into what attackers might find, organizations can identify high-risk areas early. This early visibility builds trust between security teams and stakeholders, creating a foundation for more effective collaboration.

Once a digital footprint has been established—and preferably only then—should one start to talk about defining the scope of a penetration test. Perhaps even more important than what to include is determining what not to include.

While Attack Surface Management platforms can provide digital footprints today, I implore penetration testers and companies not to rely solely on automation. Instead, complement automation with human intelligence. I often apply the Pareto Principle to this approach: automation can handle 20% of the effort and uncover 80% of the attack surface. However, that last 20%—where the truly valuable systems reside—requires the remaining 80% of the effort, driven by deep, manual testing.

Part 2: Offensive SOC – Taking Attack Surface Management and Continuous Penetration Testing to New Heights

The next evolution in penetration testing moves from annual engagements to a continuous, year-round effort. Penetration testers must focus on how emerging attack techniques and Cyber Threat Intelligence (CTI) impact the existing attack surface over time, not just once a year. They must understand that while a target might not be exploitable today, but that could change tomorrow as vendors announce vulnerabilities or Common Vulnerabilities and Exposures (CVEs) become Known Exploitable Vulnerabilities (KEVs).

Penetration testing must answer critical security questions:

  • Is an organization vulnerable to newly disclosed exploits because of missing patches?
  • Has a recent credential exposed accounts in the environment?
  • Have new assets, services, or misconfigurations emerged?

At the same time, security teams must maintain ongoing discovery of new assets, changes, and opportunities for exploitation. This dynamic, real-time model ensures that organizations remain resilient against evolving threats.

Beyond Traditional Reconnaissance: Continuous Attack Surface Management

Effective reconnaissance is crucial for successful penetration testing. This is where Attack Surface Management (ASM) evolves the one-time digital footprint exercise into a continuous cycle of reconnaissance, discovery, and monitoring. Organizations must track how their attack surface changes continuously, as new domains, services, or vulnerabilities emerge. Continuous ASM helps detect and mitigate risks in real time, ensuring that attackers have fewer opportunities to exploit gaps in security.

Many perceive this continuous reconnaissance as mere 'scanning,' but it’s far more than that. I’m often asked, ‘How often do you scan?” The answer might surprise you. It’s not just about scanning.

Offensive SOC: Turning Continuous ASM Into Actionable Insights

Continuous attack surface management relies on dozens of sensors, each operating on different schedules or triggers. Some are event-based, while others continuously gather real-time data, such as information from certificate transparency logs.

Now, imagine your ASM solution continuously recording changes—from events, scans, security tools, and more—and feeding that intel to a SIEM system. The SIEM generates alerts on these changes, deltas, and developments in the attack surface, as well as the latest trends in the CTI space. This forms the foundation of a Security Operations Center—but this time, an offensive one: an Offensive SOC.

Continuous Penetration Testing complements ASM by verifying and exploiting changes as they happen. I’ve coined this concept the 'Offensive SOC,' distinct from its defensive counterpart.

Looking ahead, the ultimate goal is a unified approach—a Purple Team SOC—where offensive and defensive efforts seamlessly work together.

Part 3: What About Red Team Exercises to the Rescue?

Red Team exercises often come to mind as a possible solution for continuous security validation. However, they have several challenges associated with them. Below, I highlight some of these challenges and explain how the Offensive SOC addressed them.

Stealth vs. Transparency

One of the most notable differences between Red Team Exercises and an Offensive SOC is their approach to stealth. Red Team Exercises prioritize stealth to mimic real-world attackers, often aiming to evade detection and challenge the Blue Team’s ability to identify and respond to threats. In contrast, an Offensive SOC does not emphasize stealth. Instead, it operates transparently, collaborating closely with the Blue Team to deliver continuous alerts and insights, often through APIs or integrated tools, to facilitate immediate remediation.

Physical and People In-Scope

Red Team Exercises often extend beyond digital attacks to include physical penetration testing and direct engagement with individuals (e.g., social engineering). Offensive SOCs, however, typically focus on digital attack surfaces, continuously probing for vulnerabilities over time. While an Offensive SOC may not involve physical or personal targeting, it compensates with persistent, real-time vulnerability detection and mitigation.

Social engineering may yield a positive result, however, I’d rather assume it works—assume breach—and focus on the actual testing and continuous improvements.

Goals and Prioritization

The ultimate goal of a Red Team Exercise is to achieve a specific breach, such as compromising a high-value asset. They simulate the actions of a motivated attacker to assess the organization’s ability to detect and respond to targeted attacks. In contrast, an Offensive SOC emphasizes mean time to prevent vulnerabilities, striving for rapid identification, reporting, and remediation of issues before they can be exploited. This approach fosters a continuous improvement cycle, aligning with change management processes that adapt to evolving threats, new CVEs, and updated attack techniques.

Scope and Duration

Both approaches start with a wide scope, identifying broad attack surfaces. However, Red Team Exercises typically narrow their focus to high-value targets as the engagement progresses. They are time-bound, often lasting a few weeks to several months. Offensive SOCs, being continuous in nature, maintain a wide scope over time, ensuring ongoing coverage and adaptability. They operate indefinitely, acting as an enduring offensive layer in the organization’s security posture.

Integration with the Blue Team

A key differentiator is how these approaches interact with the Blue Team. Red Team Exercises often operate independently, with limited or no direct collaboration during the engagement. Instead, their goal is to evaluate the Blue Team’s effectiveness post-engagement through debriefings and after-action reports. Offensive SOCs actively collaborate with the Blue Team, providing real-time data and actionable insights to improve defensive measures. Conversely,

Part 4: Convergence of Red and Blue

The fundamental difference between an Offensive SOC and a traditional Blue Team SOC lies in the role of the SIEM. In an Offensive SOC, the SIEM generates alerts for actionable penetration testing opportunities, addressing the agile nature of development and operations. In contrast, a Blue Team SOC focuses on detecting and responding to active attacks.

I believe we’ll see a convergence of these two SOCs into a single, unified 'Super SOC'—one that integrates both offensive and defensive capabilities. This future Purple Team SOC would handle everything: security auditing, penetration testing, alerting, and response, operating as a fully capable and highly efficient security powerhouse.

Let me guess—you didn’t have 'Super SOC' on your Infosec Bingo Card this year, did you?

Offensive SOCs and the Future of Security

In summary, an Offensive SOC delivers continuous, transparent, and collaborative security assessments, prioritizing rapid detection and remediation. Red Team Exercises simulate targeted adversarial attacks to evaluate and improve an organization’s detection and response capabilities. Together, these approaches can complement one another, providing both strategic and tactical insights to strengthen an organization’s overall security posture.

Let the Red Team focus on what they do best and allow Penetration Testing to evolve into its necessary future: Offensive Security Operations Centers.

Want to dive deeper into how an Offensive SOC transforms penetration testing? Watch my webcast Offensive Security Operations with Attack Surface Management and Continuous Pen Testing on demand, where I explore these concepts and methodologies. Don’t miss this opportunity to see how continuous testing can strengthen your security posture.

Let’s continue the conversation—how do you see the Offensive SOC reshaping traditional penetration testing? Share your thoughts with me on LinkedIn!

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Tags:
  • Offensive Operations, Pen Testing, and Red Teaming

Related Content

Blog
Security Awareness, Artificial Intelligence (AI), Digital Forensics, Incident Response & Threat Hunting, Cloud Security, Cyber Defense, Offensive Operations, Pen Testing, and Red Teaming, Industrial Control Systems Security, Open-Source Intelligence (OSINT)
December 10, 2024
Top SANS Summit Talks of 2024
This year, SANS hosted 13 Summits from OSINT, ICS, Ransomware, DFIR to HackFest. Here were the top-rated talks of the year.
No Headshot Available
Alison Kim
read more
Blog
powershell_option_340x340.jpg
Offensive Operations, Pen Testing, and Red Teaming, Penetration Testing and Red Teaming, Cybersecurity and IT Essentials, Cyber Defense
July 27, 2022
Month of PowerShell: Fileless Malware with Get-Clipboard
Let's take a look at a sneaky attack to use PowerShell maliciously while evading detection (and some ways to detect it).
Josh Wright - Headshot - 370x370 2025.jpg
Joshua Wright
read more
Blog
powershell_option_340x340.jpg
Cyber Defense, Digital Forensics, Incident Response & Threat Hunting, Cybersecurity and IT Essentials, Offensive Operations, Pen Testing, and Red Teaming
July 12, 2022
Month of PowerShell - Windows File Server Enumeration
In this Month of PowerShell article we look at several commands to interrogate Windows SMB servers as part of our incident response toolkit.
Josh Wright - Headshot - 370x370 2025.jpg
Joshua Wright
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn