Red Team Methodology: Understanding the Stages

Josh Tomkiel

If you’ve decided to undergo a red team assessment and engaged Schellman to perform it, you may be wondering what the next steps entail—as in, how will the next stages of the process work and what should you expect?

In this article, we can and will help clarify that by explaining some of the next decisions you need to make ahead of your engagement before getting into the details of the actual red team assessment process.

Now that you’ve decided to move forward with us for this comprehensive evaluation of your cybersecurity, let us explain how it will work.

Schellman’s Red Team Testing Process

To give you a sneak peek into how your assessment would proceed after you’ve made those important decisions, here’s an overview of our process, including the critical first (and multi-faceted) step we call project discovery.

Project Discovery (a.k.a. the Planning Stage)

As part of our collaborative approach to streamline activity, we’ll also establish formal points of contact, escalation procedures, observation windows, issue alerting processes, and active chat channels to establish a contact cadence to use throughout the engagement.

That being said, one key aspect of a red team assessment is to limit visibility and access to operations, so that only a select few individuals are aware of our work. Typically, this group includes key leaders such as your:

While these leaders generally have the necessary authority, expertise, and strategic decision-making capabilities to be involved in the operation, this otherwise restricted knowledge allows for a more effective review of your people and processes in response to observed incidents or threats.

Setting Your Red Team Assessment Goal

With the help of our red team, you’ll then decide on a specific goal or target. Red teaming allows for tailored and broad mandates, but when deciding your assessment’s goal, you should align it with your organization’s priorities or potential areas of vulnerability.

We recommend setting just a single goal, as that’ll allow us to focus efforts on a specific attack path and thoroughly evaluate the relevant security controls and incident response procedures.

Some example goals could include: