The first step is to work with our clients to define a possible scenario for the assumed breach - this could be an internal scenario, for example. We then define possible targets - this could be the compromise of the CEO or his endpoint, the compromise of specific user accounts (e.g. system administrators) or the takeover of the Microsoft Active Directory. Ideally, as few employees as possible should be involved (white team), as this will give you a truly realistic and undistorted picture of the actual state of your current IT security and IT defence level.
Assumed Breach
Preparation for Internal Attacks
In IT security, we all agree that there is no such thing as 100% protection against cyber attacks. In the Assumed Breach scenario, we assume that a malicious attacker has already gained access to your internal network. Compromised trusted internal connections (Trusted Relationship or Valid Accounts) are one possible scenario. Another example is the classic internal scenario.