homepage
Menu
Open menu
  • Training
    Go one level top Back

    Training

    • Courses

      Build cyber prowess with training from renowned experts

    • Hands-On Simulations

      Hands-on learning exercises keep you at the top of your cyber game

    • Certifications

      Demonstrate cybersecurity expertise with GIAC certifications

    • Ways to Train

      Multiple training options to best fit your schedule and preferred learning style

    • Training Events & Summits

      Expert-led training at locations around the world

    • Free Training Events

      Upcoming workshops, webinars and local events

    • Security Awareness

      Harden enterprise security with end-user and role-based training

    Featured

    Get a Free Hour of SANS Training

    Free Course Demos

    Can't find what you are looking for?

    Let us help.
    Contact us
  • Learning Paths
    Go one level top Back

    Learning Paths

    • By Focus Area

      Chart your path to job-specific training courses

    • By NICE Framework

      Navigate cybersecurity training through NICE framework roles

    • DoDD 8140 Work Roles

      US DoD 8140 Directive Frameworks

    • By European Skills Framework

      Align your enterprise cyber skills with ECSF profiles

    • By Skills Roadmap

      Find the right training path based on critical skills

    • New to Cyber

      Give your cybersecurity career the right foundation for success

    • Leadership

      Training designed to help security leaders reduce organizational risk

    • Degree and Certificate Programs

      Gain the skills, certifications, and confidence to launch or advance your cybersecurity career.

    Featured: Solutions for Emerging Risks

    New to Cyber resources

    Start your career
  • Community Resources
    Go one level top Back

    Community Resources

    Watch & Listen

    • Webinars
    • Live Streams
    • Podcasts

    Read

    • Blog
    • Newsletters
    • White Papers
    • Internet Storm Center

    Download

    • Open Source Tools
    • Posters & Cheat Sheets
    • Policy Templates
    • Summit Presentations
    • SANS Community Benefits

      Connect, learn, and share with other cybersecurity professionals

    • CISO Network

      Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders

  • For Organizations
    Go one level top Back

    For Organizations

    Team Development

    • Why Partner with SANS
    • Group Purchasing
    • Skills & Talent Assessments
    • Private & Custom Training

    Leadership Development

    • Leadership Courses & Accreditation
    • Executive Cybersecurity Exercises
    • CISO Network

    Security Awareness

    • End-User Training
    • Phishing Simulation
    • Specialized Role-Based Training
    • Risk Assessments
    • Public Sector Partnerships

      Explore industry-specific programming and customized training solutions

    • Sponsorship Opportunities

      Sponsor a SANS event or research paper

    Interested in developing a training plan to fit your organization’s needs?

    We're here to help.
    Contact us
  • Talk with an expert
  • Log In
  • Join - it's free
  • Account
    • Account Dashboard
    • Log Out
  1. Home >
  2. Blog >
  3. How Purple Team Can Use Continuous Adversary Simulation
Jeroen.jpg
Jeroen Vandeleur

How Purple Team Can Use Continuous Adversary Simulation

This blog post series offers a primer on continuous adversary emulation.

August 2, 2023

Adversary Simulation introduction

With this blog post series, I am excited to share my personal experiences and insights related to the intriguing concept of adversary simulation. Additionally, I will delve into practical applications of adversary simulation within your organization. Join me as we explore the fascinating realm of cyber security and discover how this approach can enhance your defensive strategies.

Last year, I had the privilege of developing the SANS course SEC598 Security Automation for Offense, Defense, and Cloud. Within this comprehensive course, a significant portion is dedicated to the exploration of adversary emulation and its practical implementation. It was an enlightening journey that expanded my understanding of this powerful technique and its potential benefits.

In the ever-evolving landscape of cybersecurity, organizations face an increasing need to proactively assess their defenses against advanced threats. Adversary emulation has emerged as a powerful technique to simulate real-world cyberattacks and evaluate an organization's security posture.

Adversary emulation has emerged as a powerful technique to simulate real-world cyberattacks and evaluate an organization's security posture.

Adversary simulation vs penetration testing

Adversary emulation and penetration testing are two distinct approaches used in the field of cybersecurity to evaluate the security of an organization's systems and infrastructure. While they share similarities, there are key differences between the two methodologies:

  • Adversary simulation focuses on emulating the tactics, techniques, and procedures (TTPs) employed by real-world threat actors. The goal is to understand how an actual adversary would approach and attempt to compromise an organization's systems. Adversary emulation aims to provide insights into potential vulnerabilities and weaknesses, allowing organizations to proactively enhance their defenses. It involves a comprehensive assessment that covers various stages of an attack lifecycle, from reconnaissance to exfiltration. By mirroring real-world attack scenarios, organizations can identify security gaps and develop targeted mitigation strategies. Adversary emulation often leverages automation and orchestration to scale the testing efforts and simulate a wide range of adversarial behaviors.
  • Penetration testing, commonly known as pen testing, is a more focused and targeted assessment that involves actively exploiting identified vulnerabilities in an organization's systems. The objective is to assess the resilience of specific targets by attempting to gain unauthorized access, escalate privileges, and extract sensitive information. Pen testers use a combination of manual and automated techniques to exploit vulnerabilities, uncovering potential entry points that could be exploited by malicious actors. The scope of a pen test is often predefined, and the emphasis is on verifying the effectiveness of existing security controls, identifying vulnerabilities, and providing actionable recommendations for remediation.

Let’s try to see what are some of the key differences between adversary emulation and penetration testing:

  • Approach: Adversary emulation seeks to simulate the entire attack lifecycle and replicate the behaviors of real-world threat actors, while penetration testing focuses on exploiting specific vulnerabilities within a predefined scope.
  • Goal: Adversary emulation aims to understand the tactics and techniques used by adversaries, identify potential weaknesses, and develop strategies for improved defense. Penetration testing primarily aims to identify vulnerabilities and assess the effectiveness of existing security controls.
  • Scope: Adversary emulation typically covers a wider range of attack scenarios and may simulate multiple types of adversaries. Penetration testing has a narrower focus on specific targets and vulnerabilities within a defined scope.
  • Methodology: Adversary emulation often utilizes automation and orchestration to simulate a wide range of adversarial behaviors efficiently. Penetration testing may involve a mix of manual and automated techniques to exploit identified vulnerabilities.
  • Reporting: Adversary emulation reports provide insights into the attack lifecycle, including detailed analysis of the simulated adversaries' TTPs and recommendations for improving defenses. Penetration testing reports focus on the vulnerabilities identified, their potential impact, and remediation steps.

Both adversary emulation and penetration testing play crucial roles in assessing an organization's security posture. Adversary emulation provides a broader understanding of potential attack vectors and behaviors, while penetration testing offers targeted insights into specific vulnerabilities. By combining these approaches, organizations can strengthen their overall security defenses and better prepare for real-world cyber threats. Both have their own objectives and are beneficial toward improving your security posture. The focus of this blog post series is automation for offensive techniques; this is naturally more linked with adversary emulation and how you leverage automation to continuously assess your defenses against real-world threat actors.

Starting with Adversary emulation

When considering adversary emulation, it is often associated with mimicking specific adversaries and their tactics and techniques. However, conducting adversary emulation in a continuous manner requires a more systematic approach.

To begin, it is important to define the objectives and goals of your adversary emulation program. Determine what you want to achieve, whether it is enhancing incident response capabilities, identifying vulnerabilities, or testing the effectiveness of security controls.

An effective use of adversary emulation also involves understanding the threat landscape that is specific to your industry and organization. Research and analyze the tactics, techniques, and procedures employed by real-world threat actors who target organizations similar to yours. This understanding will aid in designing realistic and relevant adversary emulation scenarios.

Identify specific attack scenarios that align with your organization's risk profile and priorities. Consider different types of adversaries and the methods they are likely to use when attempting to compromise your systems. These scenarios should be tailored to reflect the real-world threats faced by your organization.

To support your efforts, there are valuable online resources available. For instance, the SANS Purple Concepts poster released in 2022 provides insights into known adversaries and how to emulate their techniques.

Another useful and very well-known resource within the cyber security world is MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge). It is a globally recognized framework that provides a comprehensive and structured knowledge base of adversary tactics and techniques. It offers a standardized way to describe and categorize the behaviors and actions of threat actors during different stages of an attack. The MITRE ATT&CK framework is organized into matrices that represent various platforms and environments, such as enterprise, mobile, and cloud. Each matrix consists of multiple techniques that adversaries may employ to achieve their objectives. Techniques are further categorized into tactics that represent the broader goals of an attacker. MITRE ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally recognized framework that provides a comprehensive and structured knowledge base of adversary tactics and techniques. It offers a standardized way to describe and categorize the behaviors and actions of threat actors during different stages of an attack.

The MITRE ATT&CK framework is organized into matrices that represent various platforms and environments, such as enterprise, mobile, and cloud. Each matrix consists of multiple techniques that adversaries may employ to achieve their objectives. Techniques are further categorized into tactics that represent the broader goals of an attacker.

Another useful resource is the Center for Threat Informed Defense GitHub repository, which offers plans for emulating advanced persistent threats (APTs) and micro-emulation plans for common techniques.

Once you have identified relevant threats, you can begin creating playbooks or scripts that outline the step-by-step actions to be performed during adversary emulation exercises. These playbooks should include the necessary tools, techniques, and procedures to simulate the chosen attack scenarios. At NVISO, we have developed playbooks that enable us to easily rerun specific simulations, validating the effectiveness of defenses and assessing how changes in the environment impact prevention and detection capabilities for various adversaries.

All resources mentioned above are also being covered in the SANS SEC598 course, we will start with explaining some example of techniques, how they are being used by adversaries, and how you can simulate a certain threat. Several labs are included to write your own playbook, or stay tuned and use some of the tools we will discuss in the next series of our blogpost. One of the tools will be how to setup MITRE Caldera and how you can simulate standard adversaries but also techniques with customized payloads.

Conclusion

This post is an introduction to continuous adversary emulation. It is important to define objectives and understanding the specific threat landscape to conduct effective adversary emulation exercises. By tailoring attack scenarios to align with organizational risks and leveraging resources like the SANS Purple Concepts poster and MITRE ATT&CK framework, organizations can develop realistic simulations and playbooks. These playbooks enable the systematic replication of real-world threats, enhancing defenses and assessing the effectiveness of security measures.

The upcoming blog posts in this series will delve further into techniques, tools, and automation, including the setup of MITRE Caldera and customization of payloads. By embracing adversary emulation and leveraging these resources, organizations can continuously assess and improve their security posture, staying ahead of evolving threats in the dynamic cybersecurity landscape.

Share:
TwitterLinkedInFacebook
Copy url Url was copied to clipboard
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Recommended Training

  • SEC541: Cloud Security Threat Detection™

Tags:
  • Penetration Testing and Red Teaming

Related Content

Blog
Offensive Operations, Pen Testing, and Red Teaming, Penetration Testing and Red Teaming
January 31, 2024
Continuous Purple Teaming: A Practical Approach for Strengthening Your Offensive Capabilities
This post will guide you through actionable strategies to implement adversary emulation effectively with some concrete examples.
Jeroen.jpg
Jeroen Vandeleur
read more
Blog
HackFest_blog_image.png
Offensive Operations, Pen Testing, and Red Teaming, Open-Source Intelligence (OSINT), Penetration Testing and Red Teaming
November 16, 2023
A Visual Summary of SANS HackFest Summit
Check out these graphic recordings created in real-time throughout the event for SANS HackFest Summit 2023
No Headshot Available
Alison Kim
read more
Blog
HackFest_Blog.png
Offensive Operations, Pen Testing, and Red Teaming, Penetration Testing and Red Teaming
November 14, 2022
A Visual Summary of SANS Pen Test HackFest Summit 2022
On November 14-15, attendees joined us in Arlington, VA or tuned in Live Online for the SANS Pen Test HackFest Summit! We invited Ashton Rodenhiser of Mind's Eye Creative to create graphic recordings of our Summit presentations. If you missed a talk or are looking to view the Summit through a...
No Headshot Available
Alison Kim
read more
  • Company
  • Mission
  • Instructors
  • About
  • FAQ
  • Press
  • Contact Us
  • Careers
  • Policies
  • Training Programs
  • Work Study
  • Academies & Scholarships
  • Public Sector Partnerships
  • Law Enforcement
  • SkillsFuture Singapore
  • Degree Programs
  • Get Involved
  • Join the Community
  • Become an Instructor
  • Become a Sponsor
  • Speak at a Summit
  • Join the CISO Network
  • Award Programs
  • Partner Portal
Subscribe to SANS Newsletters
Receive curated news, vulnerabilities, & security awareness tips
United States
Canada
United Kingdom
Spain
Belgium
Denmark
Norway
Netherlands
Australia
India
Japan
Singapore
Afghanistan
Aland Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belize
Benin
Bermuda
Bhutan
Bolivia
Bonaire, Sint Eustatius, and Saba
Bosnia And Herzegovina
Botswana
Bouvet Island
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Cook Islands
Costa Rica
Cote D'ivoire
Croatia (Local Name: Hrvatska)
Curacao
Cyprus
Czech Republic
Democratic Republic of the Congo
Djibouti
Dominica
Dominican Republic
East Timor
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Eswatini
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
France
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Germany
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard And McDonald Islands
Honduras
Hong Kong
Hungary
Iceland
Indonesia
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Republic Of
Kosovo
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Liechtenstein
Lithuania
Luxembourg
Macau
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States Of
Moldova, Republic Of
Monaco
Mongolia
Montenegro
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia
Northern Mariana Islands
Oman
Pakistan
Palau
Palestine
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Bartholemy
Saint Kitts And Nevis
Saint Lucia
Saint Martin
Saint Vincent And The Grenadines
Samoa
San Marino
Sao Tome And Principe
Saudi Arabia
Senegal
Serbia
Seychelles
Sierra Leone
Sint Maarten
Slovakia
Slovenia
Solomon Islands
South Africa
South Georgia and the South Sandwich Islands
South Sudan
Sri Lanka
St. Helena
St. Pierre And Miquelon
Suriname
Svalbard And Jan Mayen Islands
Sweden
Switzerland
Taiwan
Tajikistan
Tanzania, United Republic Of
Thailand
Togo
Tokelau
Tonga
Trinidad And Tobago
Tunisia
Turkey
Turkmenistan
Turks And Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Vatican City State
Venezuela
Vietnam
Virgin Islands (British)
Virgin Islands (U.S.)
Wallis And Futuna Islands
Western Sahara
Yemen
Zambia
Zimbabwe

By providing this information, you agree to the processing of your personal data by SANS as described in our Privacy Policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
  • Privacy Policy
  • Terms and Conditions
  • Do Not Sell/Share My Personal Information
  • Contact
  • Careers
© 2025 The Escal Institute of Advanced Technologies, Inc. d/b/a SANS Institute. Our Terms and Conditions detail our trademark and copyright rights. Any unauthorized use is expressly prohibited.
  • Twitter
  • Facebook
  • Youtube
  • LinkedIn