The Purple Team Assessment service improves the internal security team or SOC’s ability to detect, inhibit, and respond to advanced attackers active in the environment. LMNTRIX will emulate an advanced attacker through various scenarios in each phase of the MITRE attack lifecycle as would be discussed in the plan of action.
At each phase, if malicious activity was detected, LMNTRIX will work with the internal security team to ensure that the response to the detection is appropriate and that procedures exist to ensure continued success. If the malicious activity was not detected, LMNTRIX work with customer to either better utilize the detection technologies in place for the next simulation or to identify an area for technological improvement.
As the security team detects and responds to the purple team activity, customer’s incident response team will observe the execution of incident response processes and procedures and help drive improved detection and response time. LMNTRIX will review existing logs to determine if they are sufficient for detecting purple team activity.
The purple team will use OSINT along with proprietary LMNTRIX intelligence, to create signatures that would emulate these advanced threat actors, groups’ tools, tactics, and procedures (TTPs) associated with the Customer’s industry. This approach will test the Customer’s ability to detect and respond to threats known to target your industry in as realistic a scenario as possible.
The purple team tests the client security team’s capabilities
against every phase of the attack lifecycle.
We help you
Test your security team’s effectiveness in dealing with a cyber attack
Train your team to better respond to future cyber attacks
Determine the level of effort required to compromise your sensitive data or IT infrastructure
Identify and mitigate complex security vulnerabilities before an attacker exploits them
Receive fact-based risk analysis and recommendations for improvement
What You will get
A high-level executive summary of the Red Team Assessment, catering towards executives and senior-level management
A detailed report describing actions taken during the assessment and a report of all found vulnerabilities
Fact-based risk analysis detailing the relevance of each vulnerability with respect to your environment, and techniques to validate said vulnerabilities
Strategic recommendations for long-term improvement
Ready toGet Started?
Our security experts are standing by to help you with an incident or answer questions about our
consulting and managed detection and response services.