https://www.techtarget.com/searchsecurity/feature/Inside-the-PEIR-purple-teaming-model
Purple teaming is a collaborative approach between an organization's red and blue teams to improve the cybersecurity posture without requiring additional employees. Purple teaming can also help to reduce the adversarial nature between red and blue teams by having them perform joint exercises.
Purple teaming is still relatively nascent, however. To help organizations understand how purple teams work, authors David Routin, Simon Thoores and Samuel Rossier wrote Purple Team Strategies: Enhancing global security posture through uniting red and blue teams with adversary emulation. In the book, they introduce a vendor-agnostic purple teaming model called Prepare, Execute, Identify and Remediate (PEIR). It is based on the Plan-Do-Check-Act process, a management tool designed around the continual improvement of people and products.
Learn more about PEIR in the following excerpt from Chapter 2, "Purple Teaming -- a Generic Approach and a New Model." Download a PDF of Chapter 2, which also covers the roles and responsibilities of each member of the purple team, the purple teaming maturity model and exercise types.
Learn more about purple teaming and Purple Team Strategies in an interview where authors Routin, Thoores and Rossier discuss why purple teaming is important, how to get red and blue teams to work together better and more.
Everyone should be familiar with the Plan-Do-Check-Act (PDCA) process, also called the Deming wheel, which is a generic management tool used to verify and continuously improve processes and products over time. This seems to perfectly fit what purple teaming is trying to achieve, and that is why we have based the purple teaming process on this method, resulting in a more tailored Prepare, Execute, Identify, and Remediate (PEIR) model.
This high-level process is represented in the following figure:
This scheme represents a high-level purple teaming approach where both blue and red team managers are involved. In such a situation, blue team members may or may not be informed about the exercises. Without crossing the boundaries of red teaming, whose goal is to be stealthy and assess response capabilities, a purple teaming exercise can still be performed in a blind way where most of the blue team members are not informed in order to also assess detection and response capabilities. Indeed, it is possible to simulate red team activities such as injecting logs or deploying unweaponized techniques to evaluate the blue team's overall capabilities and controls, especially investigation, escalation, and response.
Let's now see in a bit more detail each step of the process:
This workflow is vendor-independent and can cover any type of purple teaming activities. It can be used as a generic purple teaming workflow approach.
For the veterans among you, in 1993, a document called Improving the security of your site by breaking into it published by D. Farmer suggests various attack methods to defend by thinking like an attacker. It could be the first public resource describing an approach for purple teaming, even if the team, in that case, was composed of one person only.
Purple teaming exercises can be considered as a continuous security improvement process by mixing offensive and defensive skills. This exercise is not purely focused on technology but can also be shaped in different forms to improve the overall security posture (that is, people and processes too).
The foundation of cybersecurity is often described with three pillars, which are the people, the processes, and the technology (or products). Let's now see how purple teaming can address each of them.
Improving the people with purple teaming is a must. Regardless of the types and goals of the purple teaming exercise, people will always benefit from it because it gives them the opportunity to see the other side of security. The red team will learn and understand what kind of security controls are in place within their organization, how they can bypass it, and therefore think about ways to strengthen it to increase the overall security posture of the organization. On the other hand, the blue team will learn and understand how the red team, and therefore adversaries, approaches and operates during an attack scenario, as well as better understanding the strengths and weaknesses of their controls, again to improve the defense strategy.
Nevertheless, it can be useful to assess how people react and handle security alerts and incidents within an organization.
Even if it is not pure purple teaming, some professionals may also implement a blind approach where the blue team is not initially informed. It can be interesting for the blue team manager to determine whether all the members of its team can investigate and handle alerts and incidents in a consistent manner and not depend on people's interests, skills, and experience.
The following criteria should be taken into account:
Then, the purple team manager can use those Key Performance Indicators (KPIs) to create charts in order to identify improvements and benchmark against other purple teaming exercises over time. This approach is fully described in Chapter 14, Exercise Wrap-Up and KPIs.
When considering assessing people, other parameters must be considered, such as the following:
Thus, to evaluate those points, a purple approach would be to open critical cases and measure whether the blue team (especially level 1) is able to manage and respond to cases in a timely and effective manner (using a service-level agreement or an average handling time).
The capacity to adapt to TTP variations is also important; perhaps your blue team is highly trained to handle specific incidents, but what if slightly different TTPs are applied or, even worse, a different threat actor with radically different TTPs starts considering your business a potential target? This is exactly why simulation is also a key concept that need to be applied and developed. Testing your organizations controls against non-related threat actors may add value in case threat actors decided to shift targets or motivations.
In addition to people, processes are the second key pillar of any organization's cybersecurity practice; for this reason, it is important to assess several aspects, such as the following:
All these aspects should be taken into consideration when improving the processes around cybersecurity within an organization.
Technical solutions are implemented at different layers; therefore, being able to assess them is an absolute requirement to ensure the safety of your data. Purple teaming can help us with the following:
So, clearly, the old approach of red versus blue, even if still applicable, can be greatly improved. This book was created for that purpose -- giving us new concepts, tools, opportunities, and ideas to leverage purple teaming in order to improve our overall security posture.
Each of us co-authors has had experience in different environments with multiple positions, providing various visions and tried-and-tested methods of purple teaming for multiple layers of security.
Now that we understand the standard purple teaming process, the next obvious question to ask ourselves is, where do we start? That's why we believe that a maturity model is key to enabling all organizations, whether Fortune 100 or small-to-medium businesses, to start applying purple teaming within.
23 Feb 2023