
Data Security and Protection Toolkit (DSPT) 2025/2026 CAF

From Policy to Practice: Penetration Testing for ISO 27001

Dionach’s Assumed Breach assessments simulate advanced, realistic attack paths across people, process and technology so you can prioritize remediation where it matters and prove compliance to stakeholders (DSPT, DORA, NIS2, ISO 27001).
Assumed breach testing simulates a real-world cyber attack starting from a pre-established foothold within your network as if an attacker has already broken in.
This approach focuses on your organization’s ability to detect, contain, and respond to ongoing threats before they cause damage.
Unlike traditional red team exercises that simulate the full attack lifecycle, an Assumed Breach Assessment focuses on one critical phase: what happens after an attacker has already gained access.
We begin with a pre-established foothold inside your environment, replicating a realistic scenario where perimeter defences have been bypassed. From this point, we assess how effectively your organisation detects, responds to, and contains an active threat.
This targeted approach enables you to:
Throughout the assessment, our security specialists apply a broad range of real-world attacker tactics, techniques, and procedures (TTPs). This ensures your teams face realistic adversary behavior and can strengthen their response capabilities against today’s evolving threat landscape
We simulate an active attacker inside your network to identify gaps in privilege, movement, and detection.
Book a quick discovery call to outline the right assumed breach profile.
We work collaboratively to define specific objectives for the assessment. These objectives might involve testing your response to particular attack vectors or evaluating your team’s effectiveness in containing a specific type of breach scenario. We also establish the scope of the assessment, clearly outlining the areas of your network or systems that will be included in the simulated attack.
In collaboration with you, we establish a pre-established foothold within a designated area of your network. This simulates a scenario where an attacker has already bypassed your perimeter defences. This access typically has minimal access or privilege and is intended to be as realistic as possible.
The red team acts as the adversary, employing various attacker tactics, techniques, and procedures (TTPs) to achieve specific objectives without being detected. The focus is on expanding their presence within the target environment. They move laterally through the network, attempting to gain access to sensitive data or critical systems. This phase helps assess the organisation’s ability to detect and respond to intrusions and to determine the extent of the damage an attacker could cause if undetected.
After the assessment, the red team prepares a detailed report documenting their findings, methodologies, and recommendations. The report highlights the vulnerabilities discovered, the techniques used, and potential impacts. It also includes actionable recommendations to help the organisation improve its security defences. A debriefing session is conducted with the organisation’s stakeholders to discuss the findings and ensure a clear understanding of the assessment’s outcomes.
Validate your security controls and team readiness with real-world attack scenarios, maximising your defenses against sophisticated threats.
“The assumed breach assessment showed us exactly where an attacker could move inside our network and how to stop them. Dionach’s team gave us practical recommendations that improved our detection and response within days.”
Certified ethical hackers with 25+ years of experience
CREST approved and industry certified professionals
Assessments shaped to your specific risks, systems, and security priorities
Clear, prioritized findings with step-by-step remediation
Successfully tested 500+ organisations across all sectors
Testing aligned with your business objectives and risk tolerance
Get answers to common questions about our Assumed Breach service.
Speak with our experts to discuss your internal threat scenarios. We’ll design a customized Assumed Breach assessment to reveal weaknesses attackers could exploit.


