Purple teaming report
In Chapter 2, Purple Teaming – a Generic Approach and a New Model, we saw one example of a purple teaming exercise log and report, which can be found at the book's GitHub repository here: https://github.com/PacktPublishing/Purple-Team-Strategies/tree/main/Chapter-11. Now, let's look at another example of a report based on exercise logs.
This report contains your purple teaming results and is the source of the gap analysis for missing detections and blocking. For ease of management, it should contain the following fields:
- DATE: This should contain the exact timestamp of the attack.
- ID: An iterated ID that allows you to identify the tests, especially for your change management process.
- OBJECTIVE: The objective of the exercise, such as APT3 emulation, ransomware generic simulation, or vulnerability Log4j assessment.
- MITRE_TACTIC: The MITRE ATT&CK tactics must be documented for each test.
- MITRE_TECHNIQUE: The MITRE ATT...