Red Team / Blue Team / Purple Team
Red Team: The attacker team simulates realistic cyberattacks. Blue Team: The defender team detects and responds. Purple Team: Both teams collaborate to maximize learning outcomes.
Red Team and Blue Team are two opposing perspectives in cybersecurity—the attackers and the defenders. Their collaboration makes companies more resilient against real-world attacks.
Red Team
The Red Team adopts the attacker’s perspective and simulates realistic cyberattacks against an organization—with the goal of identifying vulnerabilities in processes, people, and technology that a real threat actor would exploit.
Difference from a traditional penetration test:
- Pentest: Technically focused, defined scope, often white-box
- Red Team: Holistic (people, processes, technology), realistic attacker scenario, often black-box, longer timeframe
Typical Red Team Activities:
- Phishing campaigns targeting employees
- Physical intrusion attempts (tailgating, lockpicking)
- Exploitation of technical vulnerabilities
- Social engineering against IT support and helpdesk
- Lateral movement within the network after initial access
- Data exfiltration as "proof of concept"
Tools: Cobalt Strike, Metasploit, Impacket, BloodHound, Evilginx2
Blue Team
The Blue Team is responsible for defense: detection, response, and improvement of the security posture.
Blue Team Tasks:
- Security Operations Center (SOC) - 24/7 monitoring
- Incident Response - responding to detected incidents
- Threat Hunting - proactive search for attackers
- Security Engineering - hardening of systems
- Vulnerability Management - vulnerability scanning and remediation
Tools: SIEM (Splunk, Microsoft Sentinel), EDR (CrowdStrike, Defender), Threat Intelligence Feeds, SOAR
Purple Team
The Purple Team is not a third group, but rather the structured collaboration between Red and Blue:
- The Red Team executes an attack and documents every technique (MITRE ATT&CK mapping)
- Blue Team attempts to detect the attack
- Joint analysis: What was detected? What wasn’t? Why?
- Improvement of detection rules and response processes
- Iteration until the attack technique is reliably detected
Benefits: Maximum learning effect—Red and Blue Teams work together instead of against each other. Direct transfer of attack know-how into improved defense capabilities.
TIBER-EU
TIBER-EU (Threat Intelligence-Based Ethical Red Teaming) is a European framework for red team testing at financial institutions—developed by the ECB and coordinated by national central banks. Mandatory for certain DORA-regulated companies.
The BSI offers similar frameworks for critical infrastructure.
Legal Basis
Red team exercises require written authorization with a clearly defined scope. Without authorization, red team activities are punishable by law (Section 202a et seq. of the German Criminal Code [StGB] on computer fraud and trespassing in the case of physical tests).