Creating an Adversary Emulation Plan
Before creating our emulation plan, we need to make sure that we understand what do we mean when we talk about “adversary emulation”.
What is Adversary Emulation?
There is not a clear definition about the concept of Adversary Emulation and there has been discussion even the words used to describe the activity (See, for example, Tim Malcom article on the subject: Emulation, Simulation & False Flags https://medium.com/@malcomvetter/emulation-simulation-false-flags-b8f660734482).
But I like the definition provided by Erik Van Buggenhout in his SANS Pentest Hackfest 2019 presentation: Automated adversary emulation using Caldera (https://www.sans.org/cyber-security-summit/archives/file/summit-archive-1563791194.pdf), in which he defines the activity as follows:
Adversary emulation is an activity where security experts emulate how an adversary operates. The ultimate goal is to improve how resilient the organization is versus these adversary...