Updated on 2025-05-22 GMT+08:00

RES11-05 Red/Blue Attack/Defense

Red/Blue attack/defense can simulate various complex attack scenarios to help comprehensively evaluate application resilience and detect and resolve potential risks in a timely manner.

  • Risk level

    High

  • Key strategies
    • The blue team discovers various vulnerabilities from the third-party perspective and injects faults into the software and hardware that services depend on to continuously verify the reliability of service systems. The red team handles faults based on the predefined troubleshooting and emergency response process.
    • After attack/defense drills, review the duration and operations in the fault discovery, response, and recovery phases, and sort out the required improvements and implement them to enhance system stability.