Initial-access techniques
Phishing payload delivery, credential-stuffing, exposed-service abuse. Confirms email gateway, EDR initial-detection, and authentication anomaly rules fire.
Automated attack-technique replay against your production environment, scheduled and safe. Verifies that the controls you bought, configured, and tuned still catch what they were supposed to catch.
What BAS exercises cover.
Phishing payload delivery, credential-stuffing, exposed-service abuse. Confirms email gateway, EDR initial-detection, and authentication anomaly rules fire.
Living-off-the-land binaries, scheduled tasks, registry persistence, OAuth app abuse. Tests EDR and SIEM rule coverage.
Pass-the-hash, kerberoasting, SMB enumeration, cloud cross-account walks. Tests internal east-west visibility and segmentation.
Common Windows and Linux escalation patterns, sudo misconfig, ADCS abuse. Tests host-level monitoring.
DNS tunneling, HTTPS POST to attacker domains, cloud-object exfil. Tests network DLP and outbound monitoring.
IAM privilege walks, snapshot exfil, control-plane log evasion. Tests CSPM and cloud audit-log alerting.
How a BAS engagement runs.
Outputs from a BAS engagement.
Every technique tested, the result (detected, alerted, blocked, missed), the tool that caught it, and the timestamp. Heatmap by ATT&CK tactic.
Per-run delta. Shows where coverage regressed (often after a control upgrade or tooling change). Critical for catching silent failures.
For each missed technique: what should have caught it, why it did not, what rule or configuration change would close the gap.
Continuous-monitoring evidence formatted for SOC 2, ISO 27001, PCI DSS reviewers.
Trend over time. The board sees whether the program is improving, holding, or sliding.
Once per year, a narrative report that captures the year of testing for board and audit consumption.
When BAS belongs in the program.
You spent the budget. Now you need to know whether the controls work, the rules fire, and the alerts get triaged.
A platform migration silently breaks detections. BAS catches the regression before an attacker does.
SOC 2 Type 2 and ISO 27001 expect ongoing control validation. BAS is the audit-friendly mechanism.
BAS exercises the SOC every week, not once a year. Detection engineers learn the most from real misses.
BAS FAQ.
No. Techniques are non-destructive by default. Where a technique is genuinely risky, we either skip it or run it against a representative test environment.
Vendor-neutral. We use a combination of commercial BAS platforms and custom tooling, depending on your environment and risk tolerance.
No. BAS validates controls against known techniques. A red team finds the new technique or the path your controls did not anticipate. They are complementary.
Monthly for high-risk environments, quarterly for most. Annual is too slow to catch detection drift.
Yes, eventually. Most teams run BAS internally after a year of working with us on the rule library and triage process.
A 60-minute call covers your detection stack, alert volume, and where BAS would close gaps fastest. Free.