Red team, blue team operations: a first principle idea.
Rick discusses this history of red teaming as a concept, the inclusion of penetration tests for the early mainframe computers, and the evolution into team-on-team cyber exercises.
Resources:
- “2020 Red and Blue Team Survey Reveals Positive Trends,” by SAM HUMPHRIES, exabeam.
- “3 Situations That Call for a Red Team,” by Lisa Earle McLeod, Huffington Post, 23 November 2013.
- “Cobalt Group,” Mitre ATT&CK Framework, MITRE, 23 June 2020.
- “Cybersecurity Red Team Versus Blue Team — Main Differences Explained,” BY SARA JELEN, SECURITYTRAILS BLOG, 7 December 2018.
- “Devil’s Advocate – Ancient Phrase Traced To The Roman Catholic Church,” by Ellen Lloyd, AncientPages.com, 19 November 2018.
- “ESTABLISHMENT OF NATIONAL SECURITY COUNCIL ARMS CONTROL VERIFICATION COMMITTEE - NATIONAL SECURITY DEClSTON DIRECTIVE NUMBER 65,” by President Ronald Reagan, the White House, 10 November 1982.
- “Guide to Red Team Operations,” by Raj Chandel, Hacking Articles, 5 August 2019.
- “Helpful Red Team Operation Metrics,” by Cedric Owens, Medium, 2 March 2020.
- “Inside the CIA Red Cell: How an experimental unit transformed the intelligence community,” BY MICAH ZENKO, FP, 30 OCTOBER 2015.
- “Kriegsspiel – How a 19th Century Table-Top War Game Changed History,” by MilitaryHistoryNow.com, 19 April 2019.
- “Red Storm Rising,” by Tom Clancy, Putnam Adult, 1986.
- “Red team,” by Millitary Wikia.org.
- “Red Team U. creates critical thinkers,” By John Milburn, Associated Press, 18 May 2007.
- “Red Team Vs Blue Team Testing for Cybersecurity,” by Zbigniew Banach, netsparker, 14 November 2019.
- “Red Team: How to Succeed By Thinking Like the Enemy,” by Micah Zenko, Basic Books, 3 November 2015.
- “Red Team: How to Succeed By Thinking Like the Enemy,” by Micah Zenko, Council on Foreign, 1 November 2015.
- “Red Teaming: How Your Business Can Conquer the Competition by Challenging Everything,” by Bryce G Hoffman, Crown Business, 16 May 2017.
- “Red Teams: Strengthening through challenge,” by LtCol Brendan Mulvaney, Marine Corps Gazette, July 2012.
- “Second public hearing of the National Commission on Terrorist Attacks Upon the United States,” Statement of Bogdan Dzakovic to the National Commission on Terrorist Attacks Upon the United States, 22 May 2003.
- "SECURITY IN THE COMPUTING ENVIRONMENT: A Summary of the Quarterly Seminar, Research Security Administrators - June 17, 1965," by Robert L. Dennis, System Development Corporation, for the DEFENSE DOCUMENTATION CENTER DEFENSE SUPPLY AGENCY, 18 August 1966.
- “SOVIET NONCOMPLIANCE WITH ARMS CONTROL AGREEMENTS - NATIONAL SECURITY DEClSTON DIRECTIVE NUMBER 121,” by President Ronald Reagan, the White House, 14 January 1984.
- “The Difference Between Red, Blue, and Purple Teams,” By DANIEL MIESSLER, 4 April 2020.
- “The History Of Penetration Testing,” by Ryan Fahey, infosec.
- “The importance of red teams,” by PETER ATTIA, Media, 24 May 2020.
- “THE ORIGINS AND DEVELOPMENT OF THE NATIONAL TRAINING CENTER 1976 - 1984,” by Anne W. Chapman, Office of the Command Historian, US Army Training and Doctrine Command, 1992.
- “The Red Team,” Chief - Arms Control Intelligence Staff, CIA, 17 January 1984.
- “The Role and Status of DoD Red Teaming Activities,” by the Office of the Under Secretary of Defense For Acquisition, Technology, and Logistics, September 2003.
- “Titan Rain - how Chinese hackers targeted Whitehall,” by Richard Norton-Taylor, The Guardian, 4 September 2007.
- "US Government Computer Penetration Programs and the Implications for Cyberwar,” by Edward Hunt, IEEE Annals of the History of Computing, IEEE Computer Society, 2012.
- “Where does red teaming break down?” by David Spark, Allan Alford, and Dan DeCloss, “Defense in Depth” podcast, 3 September 2020.