Security Assessment
CybrHawk Blue Team Testing Stages
-
Preparedness
-
Identification
-
Endurance
-
Elimination
-
Recovery
CybrHawk Blue Team Overview
Perimeter Defense
The blue team must always be aware of the boundaries of the network, including traffic flow, packet filtering, proxy firewalls and detection systems for intrusion
Operating System Hardening
The blue team will conduct hardening procedures on all operating systems throughout the enterprise in preparation for a computer security event.
Tools
Blue Teams use a wide range of tools to detect an intrusion, gather forensic information, analyze data, and make changes to deter future attacks and mitigate threats.

Objectives
Detecting and avoiding security checks