Targeted attack modeling

Targeted attack modelingΒΆ

To verify if your cluster is well protected against targeted attacks, you can create a simulation tool or script to model Advanced Persistent Threat (APT) behavior inside of the network.

The tool should cover the following stages of the APT model:

  1. Penetration:

    • Spear-phishing

    • Watering hole

    • USB removable storage

  2. Delivery of the APT kit

  3. Lateral movements and EoP

  4. Data collection

  5. Data exfiltration