Organization

Ref Feature Name Description
B1 Ability The tool offers a list of pre-defined abilities that can be run on one or multiple target systems
B2 Ability Configuration The tool permits personalizing an ability by changing pre-defined parameters
B3 Custom Ability The tool permits creating and executing on-fly an ability; this ability can be built from scratch or by modifying an existing one
B4 Custom Ability Saving he tool permits permanently saving and reusing a custom ability.
B5 Import Ability The tool permits importing an ability
B6 Operation The tool can run a set of abilities to perform an operation on one or multiple target systems
B7 Operation Configuration The tool permits personalizing an operation by changing pre-defined parameters or performing other operations
B8 Custom Operation The tool permits creating and running an operation on the fly by pipelining different abilities or modifying an existing one
B9 Custom Operation Saving The tool permits permanently saving and reusing a custom operation
B10 Import Operation The tool permits importing an operation

The Breach and Attack Simulation Tools available on the market offer different simulation capabilities that can be distinguished not only by their objectives but also by how they are structured. Many solu- tions subdivide the general simulation concept into smaller elements that can be grouped or chained to perform a simulation. There are different possibilities for performing this subdivision; this framework provides a two-element subdivision compatible with the solutions adopted by the various tools. These two elements are named Ability and Operation. An Ability has a basic and straightforward objective, achievable by running a few commands; multiple abilities can be grouped into an Operation to reach a more complex goal. A Simulation involves one or many operations. Therefore, the features of this section permit the reader to verify if the tool offers a logical structure similar to this, how much it is customizable, and the benefits of having multiple fine-grain elements rather than a whole “simulation object”. It is essential to consider that it may not be possible to directly compare these features with the ones in BAS solutions due to a different simulation subdivision, and an adjustment may be needed.
Attack > < Architecture