You can't fix what you don't know is broken...
What About Existing Solutions?
Configuration management tools are theoretical like flight simulators, analyzing configuration files to explain how the policy “should be” enforced, but not empirically testing the security instance (firewall, IPS/IDS, DLP, router ACL, etc.)
Pentesting is generally ad-hoc and can be likened to a test pilot. Pentests are empirical, but they are limited engagement, special flights (tests) on limited routes and are not continuous
Firebind Recon can play a key role in the MITRE ATT&CK Enterprise Framework by assisting with mitigation strategies for multiple techniques including Command and Control and Data Exfiltration
Example: Network Segmentation
Tactic: Command And Control – ID: T1043
“Adversaries may communicate over a commonly used port to bypass firewalls or network detection systems and to blend with normal network activity to avoid more detailed inspection.”
Mitigation: Network Segmentation – ID: M1030
“Architect sections of the network to isolate critical systems, functions, or resources. Use physical and logical segmentation to prevent access to potentially sensitive systems and information. Use a DMZ to contain any internet-facing services that should not be exposed from the internal network.”