Mitiga at RSAC 2025: Visit our booth, attend speaking sessions, and schedule a meeting with us!

Attacks against cloud and SaaS deployments are unfortunately inevitable.

You can wait until an attack happens to see if your organization has the tools, skills and resilience needed to respond— don't worry it won't be a long wait. Or you can take a more proactive approach by taking a red team adversarial approach now.

A red team is a group that is responsible for finding how adversaries can get in your network and do bad things, before real bad guys actually do get in. Typically, a red team will work closely with the defense teams on both how to prevent attacks when possible, and more importantly, how to detect and respond to attacks that are able to bypass prevention.

Red teams think like real attackers and embrace an adversarial mindset that can have a significant impact on helping organizations to build effective detection and response capabilities.

Adversaries live in the gaps that regular testing misses

While attackers have no shortage of tools that can be used, the real benefit of embracing an adversarial approach isn't necessarily about just using the same tools as attackers.

The real value is in thinking like an adversary and building as well as testing out approaches to infiltrate an environment.  Red teaming is about replicating the tactics, not just running exploits or signatures.

By taking this approach, red teams can uncover weaknesses that may not be found by technical testing alone. Attackers actively search out and exploit blind spots that basic forms that a basic level of security testing will not uncover. During a cloud penetration test, red teams frequently uncover risky misconfigurations, overly permissive identities, and other weaknesses.

By emulating real-world attacks in the cloud environment, red teams vividly demonstrate the lack of visibility and response capabilities before an actual breach.

Shaping red team assessments for the Cloud

Red teams have been used by organizations in years past to help improve Security Operations Center (SOC) training, but it's important to now focus on cloud and SaaS workloads that go beyond the traditional confines of the SOC.

Organizations can and should shape security assessments to focus red team activities on cloud workloads, services, and identity providers. This trains security teams by exposing them to real-world cloud attack scenarios and techniques.

When using cloud resources. Everything is fragmented. There are multiple cloud and SaaS providers, different log formats and various identity systems in place.  If an attacker gets into an organization's payroll system that's a SaaS based platform, can the SOC understand what they did? Did the attackers change the bank details to siphon money into different accounts?  If an attacker got access to your cloud infrastructure are they using it now to mine cryptocurrency with your resources?

Organizations can and should shape security assessments to focus red team activities on cloud workloads, services, and identity providers. This trains security teams by exposing them to real-world cloud attack scenarios and techniques.

Benefit of taking a red team adversarial approach to cloud and SaaS security

There are several key benefits to taking an adversarial approach to help improve cloud and SaaS security.

Identifies current visibility gaps. What is your current setup and capabilities missing in terms of cloud and SaaS visibility? Are you getting the right logs, are they in a format that can be understood and correlated to help identify potential risks?

Tests monitoring and response capabilities. How well do the security teams respond to cloud and SaaS threats today? An adversarial approach can show what capabilities actually work and which ones don't.

Provides continuous feedback to strengthen defenses. The insights from a red team assessment can be used to improve security posture and response capabilities. 

Improves speed and accuracy of detection and response. By taking an adversarial approach and regularly testing capabilities, an organization can improve speed and time to response to limit the risk of a real world attack.

Viewing security through the lens of an adversary is indispensable for building robust cloud defenses. Red teaming provides unparalleled feedback on current visibility gaps and response processes. Organizations that incorporate regular adversarial simulations measurably improve their security posture over time.

By validating and enhancing visibility, skill, and response capabilities, red teaming transforms awareness into readiness. Facing a skilled attacker in a controlled setting allows security teams to turn theoretical knowledge into practiced skill. 

Mitiga’s Red Team Mindset 

At Mitiga, our work is grounded in the red team mindset. We build our solutions and services based on what attackers do and how they think, because we know that a platform shaped by adversaries and made for the needs of modern defenders is what today’s enterprises require to heighten their cloud defense.  

LAST UPDATED:

July 2, 2024

Learn more about Mitiga’s solutions for cloud threat detection, investigation and response

Don't miss these stories:

Make Cloud Attacks Yesterday’s Problem with Mitiga at RSA Conference 2025

Visit Mitiga at booth number N-4618 at RSA Conference 2025 to learn about cloud detection and response.

Uncovering Hidden Threats: Hunting Non-Human Identities in GitHub

In the last few days, two compromised GitHub Actions are actively leaking credentials, and a large-scale OAuth phishing campaign is exploiting developer trust.

Can vulnerabilities in on-prem resources reach my cloud environment?

What risk does this Zoho password manager vulnerability present, and could this on-prem vulnerability impact cloud environments as well?

Log4Shell - identify vulnerable external-facing workloads in AWS

Cloud-based systems should be thoroughly searched for the new Log4j vulnerability (CVE-2021-44228). But this is a daunting task, since you need to search each and every compute instance, from the biggest EC2 instance to the smallest Lambda function. This is where Mitiga can help.

How Transit Gateway VPC Flow Logs Help Incident & Response Readiness

In this blog, we will focus on the security and forensic aspects of Transit Gateway VPC flow logs and expand the way they can be used by organizations to respond to cloud incidents.

Uber Cybersecurity Incident: Which Logs Do IR Teams Need to Focus On?

On September the 16th, Uber announced they experienced a major breach in their organization in which malicious actor was able to log in and take over multiple services and internal tools used at Uber. What are some of the logs that IR teams should be focusing on in their investigation?