<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Chaosengineering on Shadow Engineering</title>
    <link>https://shadow.engineering/tags/chaosengineering/</link>
    <description>Recent content in Chaosengineering on Shadow Engineering</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <copyright>© 2026 </copyright>
    <lastBuildDate>Sat, 01 Feb 2020 00:00:00 +1000</lastBuildDate><atom:link href="https://shadow.engineering/tags/chaosengineering/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Chaos Analyst</title>
      <link>https://shadow.engineering/posts/chaos_analyst/</link>
      <pubDate>Sat, 01 Feb 2020 00:00:00 +1000</pubDate>
      
      <guid>https://shadow.engineering/posts/chaos_analyst/</guid>
      <description>&lt;h2 class=&#34;relative group&#34;&gt;Abstract&#xA;    &lt;div id=&#34;abstract&#34; class=&#34;anchor&#34;&gt;&lt;/div&gt;&#xA;    &#xA;    &lt;span&#xA;        class=&#34;absolute top-0 w-6 transition-opacity opacity-0 -start-6 not-prose group-hover:opacity-100 select-none&#34;&gt;&#xA;        &lt;a class=&#34;text-primary-300 dark:text-neutral-700 !no-underline&#34; href=&#34;#abstract&#34; aria-label=&#34;Anchor&#34;&gt;#&lt;/a&gt;&#xA;    &lt;/span&gt;&#xA;    &#xA;&lt;/h2&gt;&#xA;&lt;p&gt;As organisations look to new methodologies to increase, test, and verify resiliency of infrastructure and applications,&#xA;so can SOCs look to new methodologies to validate integrity of logging, tools, platforms, analysis and re-enforce forensic&#xA;tradecraft, as they incorporate automation tools into their arsenals. Chaos Analyst is a new methodology for SOCs which&#xA;looks at implementing scenarios that force analysts to overcome obstacles that impact their ability to address alerts, or&#xA;in more advanced scenarios, validate potentially compromised logs and data. This can be incorporated into red team&#xA;activity to mimic more sophisticated attackers and manipulation, improving the ability of response, the tradecraft and&#xA;preparedness of the SOC in detecting and preventing actors from compromising all elements of the business.&lt;/p&gt;</description>
      
    </item>
    
  </channel>
</rss>
