{"id":58344,"date":"2025-05-14T11:11:03","date_gmt":"2025-05-14T09:11:03","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=58344"},"modified":"2026-03-23T16:40:18","modified_gmt":"2026-03-23T15:40:18","slug":"red-teaming-methodology","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/red-teaming\/red-teaming-methodology\/","title":{"rendered":"Red Teaming Methodology"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text admin_label=\"Text\" _builder_version=\"4.27.4\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-security-analysis-header-red-teaming.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"105px||62px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center\">Red Teaming<\/h1>\n<p style=\"text-align: center\">Our Methodology<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>In preparation for the Red Team Assessment, we work with you to define an overarching attack scenario, for example, the compromise of selected, critical IT systems or the theft of digitally stored business secrets.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"5%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Framework Parameters of the Red Team Assessment<\/h2>\n<p>&nbsp;<\/p>\n<p>Defining the framework parameters of the Red Team Assessment is of central importance for the subsequent gain of knowledge and success of the attack simulation. In general, we are guided by the renowned MITRE ATT&amp;CK\u00ae Framework. In particular, the following aspects are taken into account:<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.17.4\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.17.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_accordion open_toggle_background_color=\"#FFFFFF\" closed_toggle_background_color=\"#FFFFFF\" toggle_icon=\"&#x43;||divi||400\" icon_color=\"#F07F1D\" use_icon_font_size=\"on\" icon_font_size=\"23px\" _builder_version=\"4.27.4\" _module_preset=\"default\" body_font=\"|300|||||||\" body_font_size=\"16px\" custom_margin=\"4px|0px|-1px|0px|false|true\" border_radii=\"on|5px|5px|5px|5px\" border_color_all=\"#F6F6F6\" box_shadow_style=\"preset1\" box_shadow_spread=\"-11px\" box_shadow_color=\"rgba(0,0,0,0.22)\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_accordion_item title=\"Ihr Titel\" open=\"on\" _builder_version=\"4.18.1\" _module_preset=\"default\" custom_css_main_element=\"display: none;\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Identification of your high value targets\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.18.1\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>High value targets are the crown jewels of your company. For example, they may be trade secrets such as research results or sensitive information about a new product. However, it is just as possible to define specific IT systems or applications as the target of the attack. This could be, for example, database servers with highly confidential customer data or the entire Active Directory (AD) infrastructure, the compromise of which could mean the complete takeover of the company network.<br \/>Furthermore, it is possible to simulate certain scenarios, for example to find out how long an attacker can move through the network before being detected. Or what damage he could cause with a ransomware attack.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Definition of the threat perspective\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.27.4\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>We define this as the starting point of the attack. An attack from the internet by an external hacker is often just as conceivable as one by an insider with knowledge of the environment and access to the company's internal network. Likewise, a successful phishing attack can be defined as the starting point. In this case, for example, the attacker has control over a workstation in regular operation with - depending on the role\/function of the actual user - quite different authorizations within the corporate network.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Technical security measures\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.27.4\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]For an attack simulation under real conditions, all (technical) security mechanisms, such as web application firewalls (WAF) or intrusion detection\/prevention systems (IDS, IPS), are not disabled. The evaluation and circumvention of technical and organizational security measures is part of the Red Team Assessment.[\/et_pb_accordion_item][et_pb_accordion_item title=\"Involvement of your IT (security) organization\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.18.1\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>If desired, we can carry out the Red Team Assessment \"undercover\", i.e. with the knowledge of only a few authorized persons. In order to give our experts the opportunity to act carefully and covertly, we generally recommend a period of several weeks for the assessment. It is up to the attacker to decide when to carry out the assessment during this period, but this can be coordinated with the contacts on your side who have been initiated into the process. We will take these and other parameters into account when defining the attacker model.<\/p>\n<p>[\/et_pb_accordion_item][et_pb_accordion_item title=\"Dos and don'ts\" closed_toggle_text_color=\"#3C3C3C\" icon_color=\"#707070\" toggle_icon=\"&#x33;||divi||400\" _builder_version=\"4.18.1\" _module_preset=\"default\" border_radii=\"on|5px|5px|5px|5px\" global_colors_info=\"{}\" toggle_level=\"h4\" toggle_font=\"|300|||||||\" closed_toggle_font=\"|300|||||||\" closed_toggle_font_size=\"18px\" toggle_text_color__hover_enabled=\"on|hover\" toggle_text_color__hover=\"#F07F1D\" open_toggle_text_color__hover_enabled=\"on|hover\" open_toggle_text_color__hover=\"#F07F1D\" theme_builder_area=\"post_content\" open=\"off\"]<\/p>\n<p>In general, exclusions from certain test activities can be agreed in advance of the assessment. This can relate to certain technical tests or specific systems or system environments. Furthermore, certain attack methods such as denial of service or social engineering methods can be excluded. It is particularly important here that the mission of the assessment, i.e., the attainability of the target, is not impaired.<\/p>\n<p>[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.18.0\" _module_preset=\"default\" custom_padding=\"60px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.18.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Our Approach at a Glance<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-kick-off-workshop.svg\" alt=\"Workshop zum PCI DSS v4.0\" title_text=\"red-team-assessment-kick-off-workshop\" align=\"center\" _builder_version=\"4.18.1\" _module_preset=\"default\" width=\"60%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"color:#f07f1d;text-align:center\"><strong><\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Kick-off Workshop<\/strong><\/p>\n<p>In preparation for the assessment, we hold a kick-off workshop with your responsible contact persons. During this workshop, the threat perspective, the attacker model, and other framework parameters are defined in consultation with you based on the recommendations of our experts.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-durchfuehrung.svg\" title_text=\"red-team-assessment-durchfuehrung\" align=\"center\" _builder_version=\"4.18.1\" _module_preset=\"default\" width=\"60%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"color:#f07f1d;text-align:center\"><strong><\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Execution<\/strong><\/p>\n<p>The assessment is conducted according to the framework specified in the kick-off. To simulate an external attack realistically, the Red Team typically receives little or no information in preparation for the assessment. Furthermore, we recommend a test period of four weeks on average for the execution of the test activities, depending on the defined objective.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-berichterstellung.svg\" alt=\"VAIT Harmonisierung Anforderungen verstehen\" title_text=\"red-team-assessment-berichterstellung\" align=\"center\" _builder_version=\"4.18.1\" _module_preset=\"default\" width=\"60%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"color:#f07f1d;text-align:center\"><strong><\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Reporting<\/strong><\/p>\n<p>We report on the results of the Red Team Assessment in writing in the form of a results report. This includes a management summary and a detailed description of exploited vulnerabilities and security gaps as well as the detailed procedure and recommended measures for achieving the agreed goal.<em><\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/\/red-team-assessment-debriefing.svg\" title_text=\"red-team-assessment-debriefing\" align=\"center\" _builder_version=\"4.18.1\" _module_preset=\"default\" width=\"60%\" width_tablet=\"20%\" width_phone=\"30%\" width_last_edited=\"on|tablet\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][et_pb_text _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p style=\"color:#f07f1d;text-align:center\"><strong><\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><strong>Debriefing &amp; Presentation of Results <\/strong><\/p>\n<p>In addition, a holistic view of your company's risk is taken with regard to the Red Team Assessment, in which we address the implemented security measures and make recommendations for improving them as well as your IT (security) organization. At your request, we present the results of the assessment in a joint workshop with the defenders from your side, where suggestions for improvements of a technical and organizational nature can also be discussed. If required, we can demonstrate the conducted attacks again.<\/p>\n<p> [\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"60px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<div class=\"et_pb_module et_pb_text et_pb_text_14  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<h2>Unified Kill Chain (UKC)<\/h2>\n<\/div>\n<\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_15  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>The Unified Kill Chain (UKC) is an advanced model for describing cyber attacks that combines the phases from initial access to impact and maps both tactical and strategic steps. In Red Teaming, we align all steps with the phases of the UKC in order to realistically map relevant attack vectors and make the results directly usable for your defenders. The findings are assigned to the respective phases so that you can immediately see where attacks were successful and where your security mechanisms took effect.<\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-unified-kill-chain.svg\" title_text=\"usd-ag-red-teaming-unified-kill-chain\" url=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming-unified-kill-chain.svg\" url_new_window=\"on\" _builder_version=\"4.27.4\" _module_preset=\"default\" custom_padding=\"30px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.3\" _module_preset=\"default\" custom_padding=\"20px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.18.0\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>usd News: Get More Insights<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.21)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/threat-led-penetration-testing-tlpt-usdAG.jpg\" background_blend=\"darken\" link_option_url=\"https:\/\/www.usd.de\/en\/dora-deep-dive-threat-led-penetration-testing-tlpt\/\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"0px|34px||34px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">DORA Deep-Dive: Threat-Led Penetration Testing<br \/>(TLPT)<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/dora-deep-dive-threat-led-penetration-testing-tlpt\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" button_text_color=\"#f6f6f6\" button_bg_color=\"#F07F1D\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 100%\" button_border_width=\"0px\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.7)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-red-teaming.jpg\" background_blend=\"darken\" link_option_url=\"https:\/\/www.usd.de\/en\/red-teaming-final-boss-of-security-architecture\/\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.4\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"0px|34px||34px|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Red Teaming: Challenge Your Security Architecture With the Final Boss<\/span><\/h3>\n<p>&nbsp;[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming-final-boss-of-security-architecture\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.4\" _module_preset=\"default\" button_text_color=\"#f6f6f6\" button_bg_color=\"#F07F1D\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 100%\" button_border_width=\"0px\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" custom_padding=\"16px|||||\" hover_enabled=\"0\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.5\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.7)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-ag-news-blogpost-red-teaming-.jpg\" background_blend=\"multiply\" link_option_url=\"https:\/\/www.usd.de\/en\/red-teaming-5-questions-it-leaders-want-answered\/\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.5\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Red Teaming: 5 Questions Every<br \/>IT Leader Wants Answered<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming-5-questions-it-leaders-want-answered\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.5\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.6\" _module_preset=\"default\" background_color=\"rgba(0,0,0,0.7)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/news-usd-ag-physical-pentest-red-teaming.jpg\" background_blend=\"multiply\" link_option_url=\"https:\/\/www.usd.de\/en\/red-teaming-deep-dive-physical-pentest\/\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" alt=\"Access control in an office building using security badges, door readers, and visual laser sensors as a representation of physical penetration testing and red teaming.\" title_text=\"news-usd-ag-physical-pentest-red-teaming\" sticky_enabled=\"0\"][et_pb_text _builder_version=\"4.27.6\" _module_preset=\"default\" custom_margin=\"28px||0px||false|false\" custom_padding=\"15px||0px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"]<\/p>\n<h3 style=\"text-align: center\"><span style=\"color: #ffffff\">Physical Pentesting: How Resilient Is Your Organization?<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/red-teaming-deep-dive-physical-pentest\/\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.6\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_bg_use_color_gradient=\"on\" button_bg_color_gradient_direction=\"153deg\" button_bg_color_gradient_stops=\"#f07f1d 0%|#f29c1d 99%\" custom_margin=\"||30px||false|false\" hover_enabled=\"0\" global_colors_info=\"{}\" theme_builder_area=\"post_content\" sticky_enabled=\"0\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Red Teaming Our MethodologyIn preparation for the Red Team Assessment, we work with you to define an overarching attack scenario, for example, the compromise of selected, critical IT systems or the theft of digitally stored business secrets.Framework Parameters of the Red Team Assessment &nbsp; Defining the framework parameters of the Red Team Assessment is of [&hellip;]<\/p>\n","protected":false},"author":92,"featured_media":0,"parent":31742,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-58344","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/58344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/92"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=58344"}],"version-history":[{"count":6,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/58344\/revisions"}],"predecessor-version":[{"id":64856,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/58344\/revisions\/64856"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/31742"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=58344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}