Skip to main content
MuonPartners
Services
Architecture

Solution design and technology roadmapping

Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security

Security assessments, IAM, and compliance

AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform

Network architecture and cloud platforms

Network DesignCloud StrategyModernisation
Enterprise Architecture

Business-technology alignment

Business AlignmentPortfolio AnalysisGovernance
View all services
ProjectsCase StudiesInsightsToolsAbout
Contact Us

Services

Architecture
Solution AssessmentTechnology RoadmapsIntegration DesignSolution ArchitectureTechnical Design
Cyber Security
AssessmentsIAMComplianceSecurity BaselineCyber Innovation
Network and Platform
Network DesignCloud StrategyModernisation
Enterprise Architecture
Business AlignmentPortfolio AnalysisGovernance
ProjectsCase StudiesInsightsToolsAboutContact
Get in Touch
MuonPartners

Strategic technology consulting for Australian organisations navigating complexity.

Services

  • Architecture
  • Cyber Security
  • Network and Platform
  • Enterprise Architecture

Company

  • About
  • Products
  • Frameworks
  • Cross-Framework Mapping
  • Projects
  • Case Studies
  • Insights
  • Contact

Contact

  • [email protected]
  • Australia
  • LinkedIn

© 2026 Muon Partners. All rights reserved.

ABN 50 669 022 315 · A Muon Group company.

Privacy PolicyTerms of Service
  1. Frameworks
  2. >SP 800-53
  3. >Assessment, Authorization, And Monitoring
  4. >SP800-53-CA-8(2)
SP800-53-CA-8(2)Active

Red Team Exercises

Statement

Employ the following red-team exercises to simulate attempts by adversaries to compromise organizational systems in accordance with applicable rules of engagement: red team exercises.

Location

Control Family
Assessment, Authorization, and Monitoring

Control Details

Identifier
SP800-53-CA-8(2)
Family
CA
Parent Control
SP800-53-CA-8

Organisation-Defined Parameters

ca-08.02_odp
red team exercises

Supplemental Guidance

Red team exercises extend the objectives of penetration testing by examining the security and privacy posture of organizations and the capability to implement effective cyber defenses. Red team exercises simulate attempts by adversaries to compromise mission and business functions and provide a comprehensive assessment of the security and privacy posture of systems and organizations. Such attempts may include technology-based attacks and social engineering-based attacks. Technology-based attacks include interactions with hardware, software, or firmware components and/or mission and business processes. Social engineering-based attacks include interactions via email, telephone, shoulder surfing, or personal conversations. Red team exercises are most effective when conducted by penetration testing agents and teams with knowledge of and experience with current adversarial tactics, techniques, procedures, and tools. While penetration testing may be primarily laboratory-based testing, organizations can use red team exercises to provide more comprehensive assessments that reflect real-world conditions. The results from red team exercises can be used by organizations to improve security and privacy awareness and training and to assess control effectiveness.

Assessment Objective

red team exercises are employed to simulate attempts by adversaries to compromise organizational systems in accordance with applicable rules of engagement.

No cross-framework mappings available

← Back to Assessment, Authorization, and Monitoring
Assessment, Authorization, and Monitoring32 controls
SP800-53-CA-1Policy and ProceduresSP800-53-CA-2Control AssessmentsSP800-53-CA-2(1)Independent AssessorsSP800-53-CA-2(2)Specialized AssessmentsSP800-53-CA-2(3)Leveraging Results from External OrganizationsSP800-53-CA-3Information ExchangeSP800-53-CA-3(1)Unclassified National Security System ConnectionsSP800-53-CA-3(2)Classified National Security System ConnectionsSP800-53-CA-3(3)Unclassified Non-national Security System ConnectionsSP800-53-CA-3(4)Connections to Public NetworksSP800-53-CA-3(5)Restrictions on External System ConnectionsSP800-53-CA-3(6)Transfer AuthorizationsSP800-53-CA-3(7)Transitive Information ExchangesSP800-53-CA-4Security CertificationSP800-53-CA-5Plan of Action and MilestonesSP800-53-CA-5(1)Automation Support for Accuracy and CurrencySP800-53-CA-6AuthorizationSP800-53-CA-6(1)Joint Authorization — Intra-organizationSP800-53-CA-6(2)Joint Authorization — Inter-organizationSP800-53-CA-7Continuous MonitoringSP800-53-CA-7(1)Independent AssessmentSP800-53-CA-7(2)Types of AssessmentsSP800-53-CA-7(3)Trend AnalysesSP800-53-CA-7(4)Risk MonitoringSP800-53-CA-7(5)Consistency AnalysisSP800-53-CA-7(6)Automation Support for MonitoringSP800-53-CA-8Penetration TestingSP800-53-CA-8(1)Independent Penetration Testing Agent or TeamSP800-53-CA-8(2)Red Team ExercisesSP800-53-CA-8(3)Facility Penetration TestingSP800-53-CA-9Internal System ConnectionsSP800-53-CA-9(1)Compliance Checks