The engagement began with threat modeling workshops focusing on lateral movement and
identity abuse. From this, we designed a series of red team scenarios mapping
realistic attacker goals to chained misconfigurations and legacy gaps.
Each scenario was run as a time-boxed operation with live HUDs for security and
platform teams, emphasizing visibility, detection and controlled escalation.
Phase 01 — Recon & initial access
External recon, phishing simulations and perimeter testing identified weak
password hygiene and over-permissive service accounts.
Phase 02 — Lateral movement
Leveraged misconfigured network segments and shared admin tooling to traverse
between environments.
Phase 03 — Hardening & design
Jointly designed zero trust-aligned segmentation, identity controls and
monitoring improvements.