What is Red Teaming?
Red Teaming is an objective-based adversary simulation that tests how well your detection-and-response capability holds up against a realistic, multi-month attack — not whether a single vulnerability exists. Red teams operate against agreed objectives (exfiltrate payroll, compromise the CFO's mailbox, plant code in production), using MITRE ATT&CK techniques across initial access, privilege escalation, lateral movement, and persistence. The deliverable is a story about how your blue team performed, not a list of CVEs.
Red Teaming is what penetration testing aspires to be when an organisation has matured past 'find me bugs.' The engagement is scoped by adversary objective — e.g. 'achieve domain admin and demonstrate access to the payroll database' — not by an asset list. Red teams pick whatever path is most realistic for the threat actor being simulated, including social engineering, physical access, supply-chain compromise, and lateral movement across cloud and on-prem boundaries.
The output is not a vulnerability report. It is a narrative: 'on day 4 we phished employee X with a lookalike domain registered on day 1, escalated privileges via a misconfigured group-policy share, moved laterally to the engineering OU, and exfiltrated 12 GB of source code over DNS — which your SIEM logged but your SOC dismissed as a benign anomaly at 02:47.' Red Teaming measures detection latency, response coordination, and the quality of after-action learning.
Engagements typically run 30–90 days for the active phase, plus 2 weeks for the joint debrief with the defending team (the 'blue team') and the deliverable write-up. Modern engagements are increasingly 'purple team' collaborative: instead of pure stealth, the red team announces each technique and the blue team practices detection in near-real-time. This converts a one-off audit into a permanent capability uplift.
Key points
- Objective-based, not asset-based — the goal is access to specific data or systems.
- Uses the full MITRE ATT&CK matrix; not limited to network or web targets.
- Measures detection latency and response quality, not just exploitability.
- Includes social engineering, physical access, and supply-chain vectors when in scope.
- Deliverable is a narrative + timeline, not a CVE list.
