Getting Started
System Deployment
Attacks
Integrations
Analysis & Remediation
100

What is BAS?

Breach and Attack Simulation (BAS) is a cybersecurity testing method that simulates real-world cyber attacks on a network or system to assess its vulnerabilities and the effectiveness of its defenses.

100

Why is it important to whitelist the simulator files?

They might seem "threatening" by some EPPs

100

What is the Playbook?

A collection of more than 30,000 breach methods which can be added to an attack scenario

100

What is an integration?

An integration in the context of SafeBreach refers to the capability to connect and interact with a variety of third-party systems and tools.  

Integrations within SafeBreach are managed through a dedicated Integrations page where users can view, configure and manage these connections.  

100

Where can I find my overall security score?

On the homepage - "Security Posture Optimizer"

200

What is the goal of BAS?

The goal of BAS is to identify and prioritize vulnerabilities, assess the potential impact of an attack, and validate the effectiveness of the organization’s security controls and response plans.

200

Why should we configure impersonated users?

In order to test attacks and run commands with different privileges

200

What are APTs?

Advanced persistent threat - known threat actors

200

What is the first integration to be connected?

SIEM. It helps SafeBreach identify the attacks status (missed/detected etc.)

200

How can you hand over the aggregated hashes and ports for remediation to the IT team?

By exporting a CSV file that includes all the missed simulations

300

What is the SLA for new US-CERT alerts?

SafeBreach provides an attack/scenario within 24 hours of the alert release.

300

On which operating systems can you install simulators?

Linux, Mac and Windows

300

What are the general cyber attack phases?

Infiltration - Host Level - Lateral Movement - Exfiltration

300

What enables SafeBreach to collect data and determine attack results?

What is a SIEM integration

300

What is IOC-based remediation?

IOC-based remediation involves identifying and responding to specific indicators of compromise (IOCs) within a system to detect and mitigate cyber threats

400

Why should you define your data assets?

In order to assess their vulnerability in the simulations.

400

What is the purpose of the collector?

It aggregates data from on-prem security controls and transfers it safely to the cloud using one port

400

What are "Advanced Actions"?

Simulations that take realism to the next level and can generate a certain impact on the environment

400

Why is it beneficial to integrate your SIEM to the SafeBreach platform?

It supports the platform in the attack status identification process

400

What is "Behavioral Remediation"?

Behavioral remediation focuses on identifying unusual or suspicious activities and patterns that might not be documented as IOCs

500

What is the SafeBreach application workflow?

Attack, Analyze, Remediate, Report

500

What roles can be assigned to a simulator?

Critical Service, Infiltration, Exfiltration, eMail Attacker, eMail Target, Data Asset, Non critical (no role assigned)

500

How can you test your defense against the latest threats? (2)

Run scenarios from the  "Known Threats Series" and  by importing threats from your integrated Threat Intelligence services

500

Workflow and automation integrations allow you to?

Receive notifications and updates via email, Slack etc.

500

What is the automated analysis correlation process?

It's Responsible for matching the events fetched from the security controls and the SIEM to SafeBreach events, to detect the success or failure of attacks

M
e
n
u