Bishop Fox Adversarial Controls Testing Methodology

Download our methodology document to learn about our adversarial, attack-based approach to testing your key security controls.

Adversarial Controls Testing Methodology cover page preview on dark background.

Put Your Security Controls To The Test

Bishop Fox’s Adversarial Controls Testing service determines the effectiveness of your email/phishing, endpoint, and network security controls using an adversarial, attack-based approach mapped to the MITRE ATT&CK framework. These collaborative engagements include testing plans tailored to your unique environment, executed by Bishop Fox Red Team experts leveraging purpose-built automated playbooks.

Standard engagements take three weeks or less to complete, upon which time you receive detailed, straight-forward results and recommendations to strengthen your defenses.

The methodology outlined in this document includes:

  • Pre-assessment requirements
  • Standard engagement phases
  • Delineation of responsibilities

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.