AASE RED TEAM EXERCISES
Red Team Exercises, sometimes referred to as Adversarial Attack Simulation Exercises (AASE), are sanctioned, planned, risk-managed and objective-driven cybersecurity assessments that simulate highly sophisticated targeted attacks against an organisation.
Banks have to realise that they have systems can be very old and often out of date. Typically banks use a very old infrastructure that is becoming much harder to maintain which is exposed to multiple vulnerabilities. They also hold very sensitive data and have a responsibility to protect their customers as a breach of one institution could means thousands, if not millions of customer records being stolen.
AASE Red team exercises are designed to challenge FI’s cybersecurity defences by modelling and then executing attacks based on real adversaries’ Techniques, Tactics and Procedures (TTP). Scenarios are designed to be as realistic as possible, and may target the FI’s People, Processes and Technology with the intent to compromise organisation’s Critical Functions (CF). The primary goal of the exercise is to assess the organisation’s ability to prevent, detect and respond to cyber-attacks and discover potential weaknesses that may not be identified through standard vulnerability and penetration testing methodologies.
The Benefits Of Red Team Exercises (AASE)
By carrying out red team exercises, organisations are able to understand who is likely to try and compromise their organisation. It provides further information on likely attackers or groups, assists an organisation in understanding what their weaknesses are and allows them to improve their response and detection capability.
About Red Team Exercises (AASE)
The objectives of AASE Red Team Exercises are to assess and enhance the resilience of Financial Institutions (FI’s) against sophisticated attacks. In order to efficiently allocate their resources to the unique threats they are facing, FI’s are encouraged to create scenarios for their attack simulation by identifying the most likely adversaries and the attack vectors through threat modelling. The goal of these exercises is to assess the capability of an FI to prevent, detect and respond to cyberattacks that may impact Critical Functions or business continuity. To achieve this, these exercises simulate a full end-to-end cycle of a cybersecurity attack, replicating actions and procedures utilised by real world adversaries with a high level of intent, sophistication and capability.
AASE Red Team Exercises are designed to challenge FI’s cybersecurity defences by modelling and then executing attacks based on real adversaries’ Techniques, Tactics and Procedures (TTP). Scenarios are designed to be as realistic as possible, and may target the FI’s People, Processes and Technology with the intent to compromise organisation’s Critical Functions (CF). The primary goal of the exercise is to assess the organisation’s ability to prevent, detect and respond to cyber-attacks and discover potential weaknesses that may not be identified through standard vulnerability and penetration testing methodologies.
Due to Nettitude’s global red teaming experience, we are well placed to deliver these engagements for customers in Singapore. Over the last few years Nettitude has delivered CBEST, TIBER-EU and iCAST engagements to systemically linked financial institutions all over the world, including the UK&I, Americas, Middle East and Asia.
Nettitude has extensive experience in delivering red team engagements and has a certified team that hold CREST CCSAS, CCSAM and CCTIM certifications. All of our engagements are fully project managed, and we have dedicated managers assigned to each engagement that we deliver. We have comprehensive methodologies for these engagements and a strong list of testimonials to support our capability in this space.
For further information on how Nettitude can help please contact our team.
If I do an AASE test do I also need to do a CBEST if I have offices outside of Singapore?
It depends on what the regulator says in each region that you have a business in. AASE is specific to Singapore only.
How do I know if the company I am working with has the right experience?
The CREST website can inform you on which companies have what experience in different geographies.
Do I have to do a Threat Intelligence engagement with the same company?
No, you can use different companies for the TI and red team testing however using the same one can provide advantages such as knowledge sharing
What type of accreditations should the company I engage have?
CREST is a good indicator. Organisations who employ CCSAS and CCSAM resource are a good example of what good looks like.
Will the regulator i.e. MAS be involved in the testing?
It depends if they think they need to be. Most regulators will allow organisations to complete an AASE without direct involvement however you should engage them directly to ask.
Frequently Asked Questions about Data Privacy Security
What is an incident response policy?
An Incident response plan or policy is a process you create before you experience a cyberattack. This is so that your team has a procedure to follow when you do experience a data breach. Nettitude follows the CREST Cybersecurity Incident Response process which is broken down into 3 phases: preparation, response, and follow up. Having a breach plan gives you the confidence to quickly nullify any threat to your data privacy security.
Why is data privacy security important?
Although it has always been important, the implications and need for higher security are coming into play now that technology is indispensable to everyday life. Using apps, browsing websites, and shopping online are all examples of how your data will be stored and managed online. For organisations today, the threat of cyber theft is a pertinent one. Having comprehensive data privacy plans in place can reduce and mitigate the risks of such events.
Does Nettitude practice sustainability?
As a company with a global footprint, sustainability is an area of importance to us. We are a registered ‘Investor in People’ organisation. Taking a cue from ISO 14001, we have strong sustainability practices put in place. Our organisation also hires fairly and equally, across gender and race. By working with us, you can rest assured that we implement data privacy security measures with ethics at the core of our mission.
Get a free quote