Targeted attack modeling

Targeted attack modelingΒΆ

To verify if your cluster is well protected against targeted attacks, you can create a simulation tool or script to model Advanced Persistent Threat (APT) behavior inside of the network.

The tool should cover the following stages of the APT model:

  1. Penetration:
    • Spear-phishing
    • Watering hole
    • USB removable storage
  2. Delivery of the APT kit
  3. Lateral movements and EoP
  4. Data collection
  5. Data exfiltration