Skip to main content

Red Team Evaluation Report (RTER)

No: 562240000067 Date(g): 13/5/2019 | Date(h): 9/9/1440 Status: In-Force

Effective from 2019-05-13 - May 12 2019
To view other versions open the versions tab on the right

At the end of the red teaming exercise, the Red Teaming Provider will draft an evaluation test report, which contains an assessment of the Member Organization's cyber security resilience against the executed cyber security attacks. The report should include a diagram of how the attack scenarios were executed. This report should be issued to the White Team, Blue Team and Green Team.
 
Below the outline of the report and the required elements (not limitative):
 
Red Team Evaluation Report (RTER)
1.Introduction
 
2.Executive summary
 
3.Scope
 
 Scope of the agreed red teaming test
 
 Background on the agreed targeted critical (information) assets and functions
 
 Goal and objectives of the red teaming test
 
 Items which were explicitly out-of-scope
 
4.Control Framework - references
 
 F.E.E.R. Framework
 
 OWASP (Top-10)
 
 Others
 
5.Execution Methodology
 
 Listing all the attack stages and actions performed by the Red Team during the red teaming test
 
 How the each attack scenario was conducted, how, when and where (i.e. the exploited cyber kill chains, summarized in the form of attack vector diagrams)
 
 Explanation of the Cyber Kill Chain methodology and Tactics, Techniques and Procedures that were planned and eventually executed
 
 The timeline of activities performed (dates and time)
 
 What specific tools or software and methods were used during the attack scenarios
 
 Methodology for the risk rating for the observations
 
6.Observations
 
 Listing of the identified vulnerabilities and the weaknesses of events that did occur
 
 Observations focused on people, process and technology
 
 Observations focused on detection, response and recover
 
 Suggested risk description and risk rating for each observations
 
 Recommendations on suggested improvements
 
7.Conclusions
 
 An overall conclusion of the cyber resilience of the Member Organization
 
 Detailed conclusions for each attack scenario performed
 
 A conclusion per agreed critical information assets or function
 
Appendices 
 
 The list of involved teams and team members
 
 Screenshots with evidence
 
 Any other supportive materials
 
The report should be classified as: Confidential