What is red teaming?

7 November 2024

5 min read

Authors

Evan Anderson

Chief Offensive Strategist, Randori, an IBM Company

Matthew Kosinski

Enterprise Technology Writer

What is red teaming?

Red teaming is a process for testing cybersecurity effectiveness where ethical hackers conduct a simulated and nondestructive cyberattack. The simulated attack helps an organization identify vulnerabilities in its system and make targeted improvements to security operations.

Today, cyberattacks move faster than ever. According to the IBM X-Force Threat Intelligence Index, the time it takes to execute ransomware attacks has dropped by 94% over the last few years, from 68 days in 2019 to less than four days in 2023.

Red team operations give organizations a way to proactively uncover, understand and fix security risks before threat actors can exploit them. Red teams adopt an adversarial lens, which can help them identify the security vulnerabilities that real attackers are most likely to exploit.

The proactive, adversarial approach of red teaming allows security teams to strengthen security systems and protect sensitive data even in the face of heightened cyberthreats.

How are red teaming tests conducted?

Red teaming work is a type of ethical hacking in which security experts emulate the tactics, techniques and procedures (TTPs) of real attackers.

Ethical hackers have the same skills and use the same tools as malicious hackers, but their goal is to improve network security. Red team members and other ethical hackers follow a strict code of conduct. They get permission from organizations before hacking them, and they don’t do any real harm to a network or its users.

Instead, red teams use attack simulations to understand how malicious hackers can cause real damage to a system. During a read teaming exercise, the red team members behave as if they are real-world adversaries. They leverage various hacking methodologies, threat emulation tools and other tactics to mimic sophisticated attackers and advanced persistent threats.

These simulated attacks help determine how well an organization’s risk management systems—people, processes and technologies—might resist and respond to different types of cyberattacks.

Red team exercises are usually time-bound. A test might last anywhere from a few weeks to a month or more. Each test typically begins with research of the target system, including public information, open-source intelligence and active reconnaissance.

Next, the red team launches simulated attacks against various points in the system’s attack surface, exploring different attack vectors. Common targets include:

During these simulated attacks, red teams often face off against blue teams, who act as the system’s defenders. The red teams try to get around the blue team’s defenses, noting how they do so. The red team also records any vulnerabilities that it finds and what it can do with them. 

Red teaming exercises end with a final readout, where the red team meets with the IT and security teams to share its findings and make recommendations on vulnerability remediation.

Tools and techniques in red teaming engagements

Red team activities employ the same tools and techniques used by real-world attackers to probe an organization’s security measures.

Some common red teaming tools and techniques include:

  • Social engineeringUses tactics such as phishing, smishing, vishing, spear phishing and whale phishing to obtain sensitive information or gain access to corporate systems from unsuspecting employees.

  • Physical security testing: Tests of an organization’s physical security controls, including surveillance systems and alarms.

  • Application penetration testing: Tests web apps to find security issues that arise from coding errors, such as SQL injection vulnerabilities.

  • Network sniffing: Monitors network traffic for information about an IT system such as configuration details and user credentials.

  • Tainting shared content: Adds content onto a network drive or another shared storage location that contains malware or other dangerous code. When opened by an unsuspecting user, the malicious code runs, enabling the attacker to move laterally.

  • Brute forcing credentials: Systematically guesses passwords by trying credentials from previous breaches, testing lists of commonly used passwords or by using automated scripts.
Man looking at computer

Strengthen your security intelligence 


Stay ahead of threats with news and insights on security, AI and more, weekly in the Think Newsletter. 


Continuous automated red teaming (CART) 

Red teaming can help strengthen organizational security posture and promote resilience, but it can also pose serious challenges to security teams. Two of the biggest challenges are the cost and length of time that it takes to conduct a red team exercise.

At a typical organization, red team engagements tend to happen periodically at best, which only provides insight into an organization’s cybersecurity at one point in time. The problem is that the business’s security posture might be strong at the time of testing, but it might not remain that way.

Continuous automated red teaming (CART) solutions enable organizations to continuously assess security posture in real time. CART solutions use automation to discover assets, prioritize vulnerabilities and conduct attacks using tools and exploits developed and maintained by industry experts.

By automating much of the process, CART can make red teaming more accessible and free up security professionals to focus on interesting and novel testing.

Benefits of red teaming

Red teaming exercises help organizations get an attacker’s perspective on their systems. This perspective enables the organization to see how well its defenses would withstand a real-world cyberattack.

A simulated attack pits security controls, solutions and even personnel against a dedicated but nondestructive adversary to determine what is—or isn't—working. Red teaming can give security leaders a true-to-life assessment of how secure their organization is.

Red teaming can help an organization:

  • Identify and assess vulnerabilities in both the attack surface—points where a system might be penetrated—and attack paths—the steps that might be followed as an attack commences.

  • Evaluate how current security investments—including threat detection, prevention and response capabilities—perform against real-world threats.

  • Identify and prepare for previously unknown or unexpected security risks.

  •  Prioritize improvements to security systems.

Red teams vs. blue teams vs. purple teams

Red teams, blue teams and purple teams work together to improve IT security. Red teams conduct mock attacks, blue teams take on a defensive role and purple teams facilitate collaboration between the two. 

Red teams

Red teams are made up of security professionals who test an organization’s security by mimicking the tools and techniques used by real-world attackers.

The red team attempts to bypass the blue team’s defenses while avoiding detection. The team’s goal is to understand how a data breach or other malicious action might succeed against a particular system.

Blue teams

Blue teams are the internal IT security teams that defend an organization’s system and sensitive data from attackers, including red teamers.

Blue teams are constantly working to improve their organization’s cybersecurity. Their everyday tasks including monitoring systems for signs of intrusion, investigating alerts and conducting incident response.

Purple teams

Purple teams are not separate teams, but rather a cooperative sharing process that exists between red teamers and blue teamers.

Both red team and blue team members work to improve the organization’s security. The role of the purple team is to encourage efficient communication and collaboration between the two teams and with stakeholders.

The purple team often proposes mitigation strategies and helps enable the continuous improvement of both teams and the organization’s cybersecurity.

Penetration testing vs. red teaming

Red teaming and penetration testing—also called "pen testing"—are distinct but overlapping methods of evaluating system security. 

Similar to red teaming, penetration tests use hacking techniques to identify exploitable vulnerabilities in a system. The key difference is that red-teaming is more scenario-based.

Red-team exercises often occur within a specific time frame, and they often pit an offensive red team against a defensive blue team. The goal is to emulate the behavior of a real-world adversary.

Pen tests are more akin to a traditional security assessment. Pen testers use different hacking techniques against a system or asset to see which ones work and which ones don’t.

Pen tests can help organizations identify potentially exploitable vulnerabilities in a system. Red teaming can help organizations understand how their systems—including defense measures and security controls—perform in the context of real-world cyberattacks.

It is worth noting that pen tests and red teaming are just two of the ways that ethical hackers can help improve organizational security posture. Ethical hackers might also conduct vulnerability assessments, malware analysis and other information security services.

Related solutions
Enterprise security solutions

Transform your security program with solutions from the largest enterprise security provider.

Explore cybersecurity solutions
Cybersecurity services

Transform your business and manage risk with cybersecurity consulting, cloud and managed security services.

    Explore cybersecurity services
    Artificial intelligence (AI) cybersecurity

    Improve the speed, accuracy and productivity of security teams with AI-powered cybersecurity solutions.

    Explore AI cybersecurity
    Take the next step

    Whether you need data security, endpoint management or identity and access management (IAM) solutions, our experts are ready to work with you to achieve a strong security posture. Transform your business and manage risk with a global industry leader in cybersecurity consulting, cloud and managed security services.

    Explore cybersecurity solutions Discover cybersecurity services