Professional Documents
Culture Documents
CYBERSECURITY HANDBOOK
iv) Red team / blue team exercises: red teaming mimics real cyber threat
actors by using the same tactics, techniques and procedures. The
purpose is to train and measure the effectiveness of people, processes
and technologies used to defend the organization.25 "Red team" is the
name of the team conducting the attack, while the "blue team" is the
group of people in charge of the defense (Security Operations Center
staff, incident response team, etc.).
SUB-CONTROLS