At a time when cyber attacks are increasing in frequency, sophistication and impact, traditional defensive approaches, while necessary, are no longer sufficient.
To effectively protect information systems and anticipate attacks, businesses need to adopt an offensive posture. This proactive approach encompasses practices such as pentests, Red Teaming and Assumed Breach assessments.
In this article, we detail the principles and objectives of Assumed Breach assessments. We also look at the testing methodology and use cases for common scenarios.
Penetration testing has long been the cornerstone of security assessments. They consist of identifying and exploiting vulnerabilities in an organisation’s systems in order to correct them before they are discovered by attackers. Although essential, these tests remain focused on coverage: their objective is to discover as many potential weaknesses as possible in a limited period of time.
Red Teaming, on the other hand, offers a more targeted and realistic approach. They simulate complex attacks carried out by advanced adversaries, combining hacking, social engineering and physical intrusion techniques. These exercises test all the organisation’s defences, including the detection and response of the Security Operations Centre (SOC) teams.
However, as organisations strengthen their security perimeters, attackers are looking to bypass these defences and exploit more subtle vectors. This is where Assumed Breach comes in, an even more targeted and pragmatic approach, based on the assumption that the initial intrusion has already taken place. This methodology offers an essential response to a world where the ‘when’ the organisation will be compromised is more realistic than the ‘if’.
The Assumed Breach approach is based on the assumption that an organisation has already been or will inevitably be compromised.
Unlike penetration testing, which seeks to identify as many potential vulnerabilities as possible, Assumed Breach focuses on specific scenarios of successful attacks.
This enables to measure an organisation’s ability to detect, respond to and contain an active threat.
Indeed, Assumed Breach exercises represent a logical progression in offensive cybersecurity practices. Rather than focusing on how to get into the system, this approach starts on the inside, assuming that an attacker already has an access point. This can include:
Assumed Breach exercises enable to accurately assess:
Traditional penetration tests offer a global view of potential vulnerabilities, but are often limited in time and budget.
As a result, they prioritise maximum coverage to the detriment of depth in specific scenarios.
Assumed Breach fills this gap by focusing on targeted attacks and the real impact an attacker could cause.
One of the main challenges of Red Teaming is its high cost. Simulating a full attack requires considerable resources in terms of time, personnel and budget. These simulations, while effective, can also be time-consuming to plan and complex to execute.
Assumed Breach exercises, on the other hand, get round these constraints by starting directly where Red Teaming aims to arrive: at the heart of the network. This approach eliminates the need to breach perimeter defences and focuses on the later stages of the attack, such as lateral movement, privilege escalation or data exfiltration.
In this way, Assumed Breach simplifies logistics, reduces costs and maximises the effectiveness of offensive tests, without compromising their realism or impact.
Assumed Breach simulations enable to reproduce common threat situations, such as:
By focusing tests on credible scenarios, security teams can identify specific gaps in their current defences and prioritise corrective actions.
Before starting an Assumed Breach assessment, it is essential to clarify expectations and priorities. These objectives may vary depending on the organisation’s level of cyber security maturity.
For example, a company may want to assess the robustness of its internal defences by simulating advanced attack scenarios. Others may want to test the responsiveness of their teams to an intrusion in progress.
Another common objective is to assess the potential impact of a compromise on critical assets, such as sensitive databases or cloud infrastructures. These results must be aligned with the company’s strategic challenges to maximise the value of the assessment.
The choice of scenario determines the relevance of the exercise. Each scenario is designed to reflect realistic threats adapted to the organisational context. This may include:
This choice is based on a prior analysis of the risks specific to the company and its potential vulnerabilities.
Once the initial access has been simulated, the testers concentrate on identifying the strategic targets. This phase includes mapping the internal network, analysing user account permissions, and looking for misconfigured systems or services.
Databases, application servers and cloud access points are among the prime targets. The aim is to quickly identify exploitable weaknesses that could allow lateral movement or privilege escalation.
In this phase, the testers implement the tactics needed to exploit the vulnerabilities discovered. This may include taking control of privileged accounts, gaining access to critical systems or exfiltrating sensitive data.
They also simulate lateral movements to assess the ability of security systems to detect and contain an advance into the internal network. The aim is to reproduce the post-compromission stages of a real attack.
The exercise concludes with the submission of a detailed report. This document includes a full analysis of the vulnerabilities discovered, the tactics used and the simulated impact on the organisation.
Concrete recommendations are proposed for each problem identified, prioritised according to criticality. This report is a valuable tool for guiding technical and decision-making teams in improving their security posture.
The Assumed Breach approach explores different compromise scenarios that reflect the real threats to which organisations are exposed.
Here are some detailed examples, with case studies to illustrate their application.
Scenario: An attacker has obtained an employee’s credentials through phishing or information leaks. The attacker uses this access to compromise the Single Sign-On (SSO) portal and gain access to third-party applications.
Use Case: A compromise in a company using Microsoft 365
In this type of scenario, the expected result may concern, among other things:
Scenario: An attacker takes control of a user workstation and uses this access to explore the internal network and reach critical systems.
Use Case: Compromise of a user workstation using a malicious file
Here, the objective may involve, among other things:
Scenario: An attacker targets the DevOps infrastructure to compromise the development chain.
Use Case: Intrusion into a private Git repository
In this type of scenario, the expected result may concern, among other things:
For more information on this scenario, you can read our article, which describes a mission halfway between pentest and Assumed Breach: White box audit of a CI/CD pipeline on AWS.
Scenario: An attacker exploits a known vulnerability on a public server to access the internal network.
Use Case: Exploitation of a poorly configured web application
Here, the objective may involve, among other things:
Scenario: An attacker gains physical access to the premises to compromise a terminal or install a malicious device.
Use Case: Intrusion during a company visit
In this type of scenario, the objectives may be as follows:
Vaadata is a company specialised in offensive security. We provide penetration testing, red teaming and Assumed Breach exercises to assess and strengthen our clients’ cyber resilience.
ISO 27001/27701 certified and CREST accredited, we are committed to industry best practices and to providing services in line with the most stringent security standards.
These certifications guarantee a rigorous approach and delivery that meets our clients’ expectations.
Author: Amin TRAORÉ – CMO @Vaadata