Penetration
Testing is the method of attacking system vulnerabilities in a similar way to
real malicious attackers.
Typically,
Penetration Testing services are requested when a system or network has
exhausted investments in security and clients are seeking to verify if all
avenues of security have been covered. Penetration Testing can be Black, White,
or Gray box depending on the scope of work agreed upon.
The key
difference between a Penetration Test and Vulnerability Assessment is that a
Penetration Test will act upon vulnerabilities found and verify if they are real
reducing the list of confirmed risk associated with a target.
A
Vulnerability Assessment of a target could change to a Penetration Test once
the asset owner has authorized the service provider to execute attacks against
the vulnerabilities identified in a target.
Typically,
Penetration Testing services have a higher cost associated since the services
require more expensive resources, tools, and time to successfully complete
assignments. One popular misconception is that a Penetration Testing service enhances
IT security since services have a higher cost associated than other security
services:
- Penetration Testing does not make IT networks more secure, since services evaluate existing security! A customer should not consider a Penetration Test if there is a belief the target is not completely secure.
- Penetration Testing can cause a negative impact to systems: It's critical to have authorization in writing from the proper authorities before starting a Penetration Test of an asset owned by another party. Not having proper authorization could be seen as illegal hacking by authorities. Authorization should include who is liable for any damages caused during a penetration exercise as well as who should be contacted to avoid future negative impacts once a system is damaged. Best practice is alerting the customers of all the potential risks associated with each method used to compromise a target prior to executing the attack to level set expectations. This is also one of the reasons we recommend targeted Penetration Testing with a small scope. It is easier to be much more methodical in your approach. As a common best practice, we receive confirmation, which is a worst case scenario, that a system can be restored by a customer using backups or some other disaster recovery method.
Penetration
Testing deliverable expectations should be well defined while agreeing on a
scope of work. The most common methods by which hackers obtain information about
targets is through social engineering via attacking people rather than systems.
Examples are interviewing for a position within the organization and walking
out a week later with sensitive data offered without resistance. This type of
deliverable may not be acceptable if a customer is interested in knowing how
vulnerable their web applications are to remote attack. It is also important to
have a defined end-goal so that all parties understand when the penetration
services are considered concluded.
Usually, an agreed-upon deliverable serves
this purpose.
A Penetration
Testing engagement's success for a service provider is based on profitability
of time and services used to deliver the Penetration Testing engagement. A more
efficient and accurate process means better results for less services used. The
higher the quality of the deliverables, the closer the service can meet
customer expectation, resulting in a better reputation and more future
business. For these reasons, it's important to develop a methodology for
executing Penetration Testing services as well as for how to report what is
found.
No comments:
Post a Comment