Attack Simulation Packs
Detective Controls Testing on the NetSPI Platform
Focused simulation packs to validate the efficacy of your detective controls
NetSPI Detective Controls Testing uses real-world simulations to validate the effectiveness of security controls across endpoint security solutions, network security solutions, SIEMs, and MSSPs. It identifies critical gaps, including misconfigurations and missed detections, and provides focused testing (simulation packs) to fit your unique environment. The focused simulation packs deliver comprehensive manual testing led by our security experts, who will engage with your security operations team to guide you through the process. You can select individual simulation packs or combine them for discounted pricing.
How It Works
- NetSPI designs the simulation packs and leverages existing Detective Controls Testing procedures and plays.
- NetSPI will work with you in real-time to execute tactics, techniques and procedures (TTPs) that simulate real-world attackers and determine the level of visibility the current controls offer.
- NetSPI will educate your team on the TTPs being executed and the detection opportunities unique to each.
- After NetSPI performs each test, you will determine if the activity generated logs, triggered any detections or alerts, and/or triggered a response.
- Findings will include mappings to MITRE ATT&CK technique IDs. The technique number will be included in the finding references, and directly noted in the finding names provided.
- Requires one point of contact that can be present during testing that can provide feedback on what security events generate logs and alerts.
- Subscription includes access to The NetSPI Platform for one year, where you can leverage, test, and retest attack scenarios based on real-world TTPs outlined in the MITRE ATT&CK framework, and derived from NetSPI’s extensive industry experience and research.
Standard Requirements
- Access to a standard company workstation, virtual machine, or virtual desktop infrastructure (VDI) with standard security software policies installed.
- One local administrator account on the provided workstation(s).
- One Active Directory domain user account that can log into the workstation(s). This domain user will also require VPN access and an email account.
- One Active Directory domain user with “Domain Admin” privileges.
""



Ransomware
ESXi
MacOS