Blue_Team_Fundamentals_Module_01_
Blue_Team_Fundamentals_Module_01_
Blue Team
Fundamentals
Module : 01 | INTRODUCTION TO CYBER DEFENCE
Introduction to
Cyber Defense
Introduction to Cyber Defense
● Cyber defense is the strategy or a practice of ● Cyber defense is a vital part of cybersecurity, as it
protecting IT infrastructure from an malicious aims to safeguard the confidentiality, integrity,
intrusions. and availability of data and resources
Ref: https://www.cyberark.com/resources/blog/unpacking-the-uber-breach
OKTA Data Breach
The attacker can successfully extract an session & cookies from a
compromised third party entity.
By the result of the attack OKTA experienced down fall of shares upto 11.5%.
1. Attacker compromised an okta employee or a third party entity
2. OKTA support case management system
3. HAR File access
4. Extracting sessions & cookies
Ref: https://www.cyberark.com/resources/blog/unpacking-the-uber-breach
Key Component of
Cyber Defense
Red X Blue X Purple
Teaming
Red Teaming
● Red teaming is commonly used in the context of ● Red teaming is a structured and strategic approach
cybersecurity to identify and mitigate vulnerabilities in used to assess and improve an organization's security.
an organization's IT infrastructure and data protection Some important pointers :
measures. ○ Identify Vulnerabilities
○ Attack Simulation
● Red teaming is a strategic process used to evaluate ○ Improve Security Measures
and improve an organization's security, ○ Evaluate Security Controls
decision-making by simulating adversarial attacks
and threats
Blue Teaming
● Blue team is generally responsible for defending an ● Blue teaming plays a critical component of a robust
organization's systems and networks against the cybersecurity strategy.
external/internal cyber attacks. ○ Continuous Monitoring
○ Incident Detection
● Blue teaming is primarily concerned with proactive or ○ Incident Response
reactive security measures, monitoring, incident ○ Security Improvement
detection, response, and maintaining an
organization's security posture
Purple Teaming
● Purple teaming is a cybersecurity exercise or testing ● Generally Purple teaming focus on continuous
methodology that combines elements of both red improvement and learning. Several key concepts of
teaming and blue teaming to improve an purple teaming are:
organization's overall security posture. ○ Continuous Improvement
○ Breach and Attack Simulation
● The key concept of Purple Teaming is to enhance an ○ Scenario-Based Testing
organization's cybersecurity by fostering collaboration ○ Realistic Assessment
between red teams and blue teams. ○ Reporting
Roles & Responsibilities
of Cyber Defenders
Roles & Responsibilities
of Cyber defense
The role hierarchy in cyber defense varies across
organizations, and the specific titles and responsibilities
may differ. However, in a typical cyber security hierarchy,
you may find the following roles, organized in a
hierarchical structure based on increasing levels of
responsibility and expertise:
Leadership Positions
methodology, this method helps us to contain the ● Communications: Establish and maintain communication
By implementing such function which increase the determine their scope and impact.
ability to reduce the impact of a potential ● Mitigation: Implement measures to contain and mitigate
[email protected]
To know more about our offerings, please visit: https://cyberwarfare.live