In many countries, government agencies resort to third parties to acquire security services of many kinds, including Red Team operations to test the effectiveness of own defenses mechanisms. Absolute trust is a key requirement, lest a potentially devastating finding be exploited by a treacherous Red Team against the same entity which commissioned the operation, or sold to its adversaries. In our endeavour as a joint private-academic initiative to address this peculiar market, we observed that a structured approach to this issue is much less common than we would have expected. In this work, we outline the process we are devising to offer customers a verified environment, but integrating it with an evidence-based proof of their correct behavior during the operation, striving to solve the “Quis custodiet ipsos custodes” struggle in an offensive setting.

Al Sadi A., Berardi D., Callegati F., Melis A., Prandini M., Tolomei L. (2023). A Structured Approach to Insider Threat Monitoring for Offensive Security Teams. New York : IEEE [10.1109/CCNC51644.2023.10060017].

A Structured Approach to Insider Threat Monitoring for Offensive Security Teams

Al Sadi A.
Membro del Collaboration Group
;
Berardi D.
Conceptualization
;
Callegati F.
Writing – Review & Editing
;
Melis A.
Membro del Collaboration Group
;
Prandini M.
Writing – Review & Editing
;
2023

Abstract

In many countries, government agencies resort to third parties to acquire security services of many kinds, including Red Team operations to test the effectiveness of own defenses mechanisms. Absolute trust is a key requirement, lest a potentially devastating finding be exploited by a treacherous Red Team against the same entity which commissioned the operation, or sold to its adversaries. In our endeavour as a joint private-academic initiative to address this peculiar market, we observed that a structured approach to this issue is much less common than we would have expected. In this work, we outline the process we are devising to offer customers a verified environment, but integrating it with an evidence-based proof of their correct behavior during the operation, striving to solve the “Quis custodiet ipsos custodes” struggle in an offensive setting.
2023
Proceedings of IEEE 20th Consumer Communications & Networking Conference (CCNC)
628
631
Al Sadi A., Berardi D., Callegati F., Melis A., Prandini M., Tolomei L. (2023). A Structured Approach to Insider Threat Monitoring for Offensive Security Teams. New York : IEEE [10.1109/CCNC51644.2023.10060017].
Al Sadi A.; Berardi D.; Callegati F.; Melis A.; Prandini M.; Tolomei L.
File in questo prodotto:
File Dimensione Formato  
IEEE_CCNC_2023.pdf

accesso aperto

Tipo: Postprint
Licenza: Licenza per accesso libero gratuito
Dimensione 417.15 kB
Formato Adobe PDF
417.15 kB Adobe PDF Visualizza/Apri

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11585/923396
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 1
  • ???jsp.display-item.citation.isi??? 0
social impact