Red Team – Blue Team


Red Team – Blue Team

Reading Time: 2 minutes

“Red team – Blue team” is a popular parlance in the Information security domain. It actually imitates military tactics, ” red teams” and “blue teams” who work in offensive and defensive positions. Protecting the infrastructure of an organization and ensuring the complete security of an organization is the ultimate goal of every security program.

Every organization wants their precious data to be safe, for their data not to fall into wrong hands, not to have any of their client’s passwords stolen, not to have any of their private conversations being snooped on and more…How do we achieve this in the Information security domain? By forming two teams – the ‘Red Team’ and the ‘Blue Team’.

Red Team:

The ‘Red Team’ is:

  • The offensive team or the attacking team
  • It consists of team members who perform duties similar to pen-testers who will attack and test an organization’s defenses
  • It may consist of team members from outside the organization 
  • The Red team will have skills pertaining to performing the attacks like phishing, social engineering, masquerading like employees and more
  • The ‘Red Team’ will attack an organization’s defenses and find loop holes in the system that might be potentially attacked by hackers

Blue Team:

The Blue Team is:

  • The defensive team
  • Will erect all defenses by ensuring that necessary software (such as firewalls, anti-virus definitions) have been installed and all patches are downloaded as and when they are released
  • They will also ensure that all loopholes in the security program are sealed
  • The ‘Blue team’ will have to keep up with all the new security threats and bugs in the Information security landscape and mitigate them accordingly
  • The ‘Blue team’ will have to re-group and re-strategize once the threat of attacks looms

Who is more important? (Red Team or Blue Team?)

Both the teams are equally important as both of them work for the betterment of an organization. While one team erects defenses and makes sure everything is secure, the other team attacks it and shows the vulnerability of defenses. The best way to work  of course, is for the “Red team” to think like the “Blue team” and attack the defenses and for the “Blue team” to think like the “Red team” and create good defenses!

This way, the organization can try to be as secure as possible!

There is also a ‘purple’ team but that will be for another post… 🙂

This post is for alphabet ‘R’ for the #Blogchatter challenge. The previous post can be found here.






About the author

Jayanthi administrator

7 Comments so far

Sitharaam JayakumarPosted on12:47 pm - Apr 20, 2019

Your excellent post explains how security is managed in some very top notch organizations. Unfortunately, though I am a techy I have never been a part of a security team and do not have exposure at this level. A great article like all your articles in A to Z 2019

Sonia ChatterjeePosted on3:00 pm - Apr 20, 2019

I have learned so many things in the digital world because of your informative posts. This one was a new concept to me.

JayanthiPosted on3:12 pm - Apr 20, 2019

Thanks Sonia! 🙂 Your posts delight me too… 🙂

Mayuri NidigalluPosted on4:09 pm - Apr 20, 2019

You know what your posts make me realise, Jayanthi? Tha there is so much going on ‘behind the scenes’ in the tech world that we are unaware of. Thanks for letting us know.

    JayanthiPosted on11:29 pm - Apr 20, 2019

    Thanks Mayuri…it is the “behind the scenes” thought that makes me curious about Information security and propels me to write more… 🙂

SuhasiniPosted on3:13 pm - Apr 24, 2019

Thats a detailed post Jayanthi. Thanks for sharing it

Leave a Reply