What is an Assumed Breach Exercice?
An Assumed Breach exercise tests an organisation's detection and response capabilities based on the assumption that an attacker has already successfully penetrated the information system. The objective is to test security measures and response processes when an attack is already underway, in order to measure their effectiveness in a critical context.
At the end of the exercise, a detailed report is provided. It describes the scenarios tested, the actions taken by the auditors, the detection capabilities observed, and the strengths and weaknesses in incident management. These results are accompanied by operational and strategic recommendations to strengthen overall resilience and optimise the organisation's defence posture in the event of a compromise.
Examples of Assumed Breach Scenarios
We simulate realistic compromise scenarios to assess the potential impact of an intrusion and test your detection, response and resilience capabilities. Each exercise is tailored to your business challenges, your level of maturity and the most likely threats to your organisation.
Many organisations ask us to assess their ability to detect and contain a breach. Our Assumed Breach exercises can be used in a variety of contexts: validating detection systems, testing incident response procedures, strengthening the resilience of critical systems, or preparing for advanced threats.
Assumed Breach Methodology and Phases
Defining the objectives of the exercise
Before starting the exercise, we work with your teams to define the objectives, including the scope (systems, users, environments), priority threat scenarios, operational constraints and success criteria. This step ensures alignment with your business objectives and critical risks, and helps define performance indicators.
Scenario selection
We select and customise scenarios based on the organisation’s threat profile and maturity. Each scenario is adapted (both technically and operationally) to ensure realism and relevance.
Reconnaissance and mapping
Targeted analysis phase from the initial foothold: identification of possible attack paths, discovery of application dependencies and mapping of accessible critical assets. This step guides exploitation activities and identifies priority controls to be tested.
Exploitation and lateral movement
Auditors simulate realistic offensive actions from the point of compromise: lateral movement, privilege escalation, persistence and simulated data exfiltration.
Reporting and recommendations
At the end of the exercise, we deliver a structured report: executive summary, technical description of the scenarios and vectors exploited, evidence and attack timeline, and a prioritised remediation plan (quick wins and strategic actions).
Conduct an Assumed Breach Exercise with Vaadata, a Company Specialising in Offensive Security
Vaadata designs and executes tailored Assumed Breach exercises, focused on simulating an active compromise within your environment. Rather than testing only entry points, our scenarios start ‘from the inside’ to measure detection capabilities, speed of containment and the effectiveness of remediation procedures.
ISO 27001 and ISO 27701 certified and CREST accredited, we apply rigorous governance and confidentiality standards throughout the exercise. These accreditations ensure secure execution in line with the expectations of business stakeholders and technical teams.





