Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Purple Team Strategies

You're reading from   Purple Team Strategies Enhancing global security posture through uniting red and blue teams with adversary emulation

Arrow left icon
Product type Paperback
Published in Jun 2022
Publisher Packt
ISBN-13 9781801074292
Length 450 pages
Edition 1st Edition
Arrow right icon
Authors (4):
Arrow left icon
 Routin Routin
Author Profile Icon Routin
Routin
 Molho Molho
Author Profile Icon Molho
Molho
 Thoores Thoores
Author Profile Icon Thoores
Thoores
 Rossier Rossier
Author Profile Icon Rossier
Rossier
Arrow right icon
View More author details
Toc

Table of Contents (20) Chapters Close

Preface 1. Part 1: Concept, Model, and Methodology
2. Chapter 1: Contextualizing Threats and Today's Challenges FREE CHAPTER 3. Chapter 2: Purple Teaming – a Generic Approach and a New Model 4. Chapter 3: Carrying out Adversary Emulation with CTI 5. Chapter 4: Threat Management – Detecting, Hunting, and Preventing 6. Part 2: Building a Purple Infrastructure
7. Chapter 5: Red Team Infrastructure 8. Chapter 6: Blue Team – Collect 9. Chapter 7: Blue Team – Detect 10. Chapter 8: Blue Team – Correlate 11. Chapter 9: Purple Team Infrastructure 12. Part 3: The Most Common Tactics, Techniques, and Procedures (TTPs) and Defenses
13. Chapter 10: Purple Teaming the ATT&CK Tactics 14. Part 4: Assessing and Improving
15. Chapter 11: Purple Teaming with BAS and Adversary Emulation 16. Chapter 12: PTX – Purple Teaming eXtended 17. Chapter 13: PTX – Automation and DevOps Approach 18. Chapter 14: Exercise Wrap-Up and KPIs 19. Other Books You May Enjoy

The purple teaming maturity model

Whether our blue team is composed of one person or a full SOC and Computer Security Incident Response Team (CSIRT), the maturity model should give us a place to start and help us make our way up to the top.

We, humbly, tried to develop a new approach while having in mind that the industry is overwhelmed with new tools, acronyms, frameworks, and models every day. So, we tried to stick to something simple and applicable to any kind of organization. We strongly believe that this practical model to purple teaming will help anyone succeed:

Table 2.2 – The purple teaming maturity model

As we can see here, the model is meant to fit any organization's size. Of course, third-party tools or services can help in fulfilling a role, as stated previously. Maturity levels are not meant to be aligned between all teams. It is also important to keep in mind automation as we mature; repeated activities must be automated as much...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at ₹800/month. Cancel anytime
Visually different images