Phase 1: Evasive Testing
We simulate real-world adversaries who seek to exploit gaps in physical security controls, focusing on stealth and minimal detection. Activities include:
- Remote Reconnaissance – Gathering information online and through open sources to identify potential vulnerabilities before arriving on-site.
- On-Site Surveillance – Observing facility routines, employee behaviors, and physical controls from public or accessible areas.
- Threat Profiling – Assessing facility and staff for susceptibility to specific threat actor tactics.
- Evasive Facility Access – Attempting covert entry into facilities with defined objectives, mimicking tactics of sophisticated adversaries.
- Post Exploitation – Identifying and documenting potential consequences of unauthorized access.