In many countries, government agencies resort to third parties to acquire security services of many kinds, including Red Team operations to test the effectiveness of own defenses mechanisms. Absolute trust is a key requirement, lest a potentially devastating finding be exploited by a treacherous Red Team against the same entity which commissioned the operation, or sold to its adversaries. In our endeavour as a joint private-academic initiative to address this peculiar market, we observed that a structured approach to this issue is much less common than we would have expected. In this work, we outline the process we are devising to offer customers a verified environment, but integrating it with an evidence-based proof of their correct behavior during the operation, striving to solve the “Quis custodiet ipsos custodes” struggle in an offensive setting.
Al Sadi A., Berardi D., Callegati F., Melis A., Prandini M., Tolomei L. (2023). A Structured Approach to Insider Threat Monitoring for Offensive Security Teams. New York : IEEE [10.1109/CCNC51644.2023.10060017].
A Structured Approach to Insider Threat Monitoring for Offensive Security Teams
Al Sadi A.Membro del Collaboration Group
;Berardi D.Conceptualization
;Callegati F.Writing – Review & Editing
;Melis A.Membro del Collaboration Group
;Prandini M.Writing – Review & Editing
;
2023
Abstract
In many countries, government agencies resort to third parties to acquire security services of many kinds, including Red Team operations to test the effectiveness of own defenses mechanisms. Absolute trust is a key requirement, lest a potentially devastating finding be exploited by a treacherous Red Team against the same entity which commissioned the operation, or sold to its adversaries. In our endeavour as a joint private-academic initiative to address this peculiar market, we observed that a structured approach to this issue is much less common than we would have expected. In this work, we outline the process we are devising to offer customers a verified environment, but integrating it with an evidence-based proof of their correct behavior during the operation, striving to solve the “Quis custodiet ipsos custodes” struggle in an offensive setting.File | Dimensione | Formato | |
---|---|---|---|
IEEE_CCNC_2023.pdf
accesso aperto
Tipo:
Postprint
Licenza:
Licenza per accesso libero gratuito
Dimensione
417.15 kB
Formato
Adobe PDF
|
417.15 kB | Adobe PDF | Visualizza/Apri |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.