Penetration testing: an enterprise guide
Davey Winder investigates the role of penetration testing within the enterprise: What is it and why do you need it?
Given the ever increasing number of risks to your data, getting your network security strategy right is more important than ever.
What is it?
What does penetration testing actually mean? As the Assessment Practice Manager at Rapid7, Jack Daniel heads up the penetration testing professional services unit for the company. Daniel defines penetration testing, more commonly known within the IT Security community as pen testing or ethical hacking, as being "a manual, time-limited test emulating how a malicious individual would attack your environment with an end goal insight."
While most assessments are based on some measure of quantitatively scored risk, which is theorised and weighted on a number of factors, penetration testing executes attacks from a real-world attacker's perspective to highlight what the real risks are.
This begs the question of what the end goal is. It's not quite so simple to define, but the list may include such things as intellectual property, financial records, personal identifiable information (PII) or even an attempt to defame the organisation through service outages, defacing digital property or some other shaking of consumer confidence. "A penetration test does what no other assessment can," Daniel explains. "It tests your susceptibility to an attack."
So, while most assessments are based on some measure of quantitatively scored risk, which is theorised and weighted on a number of factors, penetration testing executes attacks from a real-world attacker's perspective to highlight what the real risks are.
Do you need it?
Kate Craig-Wood, managing director of Memset, knows a thing or two about penetration testing from the enterprise side of the fence as her organisation has been there, done that and can wear the 'We have been pen tested' T-shirt. IT Pro asked her how Memset went about this and whether every enterprise should be following her lead...
"We initially contacted a CREST consultancy, Trusted Management, who advised us which pen tests we should be doing and then they recommended Incryption to us who are part of the Tiger scheme, who worked with us to help design the tests and carry them out," Craig-Wood said.
As for which enterprises should be thinking about doing the same, is the answer really as simple as 'anyone who holds value in their data' or is it a little more complex? After all, ISO 27001 as a whole does not specifically state that penetration testing is a requirement for certification, for example.
"It's a great add-on and can certainly help you to prove that your systems are protected from fraudulent activity or unauthorized disclosure," Craig-Wood argues. And, as for any enterprise looking to work with government, now that G-Cloud has come into play, they will need to undergo some level of pen testing.
"Even if you're operating at the low end IL1 and IL2 levels and it need not be that sophisticated either, we simply set up an account, gave the hackers access to a Miniserver VM - which they used to attack other machines - and so on," Craig-Wood insists. If you are operating at IL3 or in finance or a large corporation, then pen testing would be pretty much mandatory. What it need not be is prohibitively expensive. "It's worth spending the money to have your systems checked and you shouldn't be spending much more than 2-3K to undergo pen testing," Craig-Wood concludes "If you are, look for someone else who is CESG approved or part of the Tiger scheme."
In This Article
Navigating the new normal: A fast guide to remote working
A smooth transition will support operations for years to comeDownload now
Leading the data race
The trends driving the future of data scienceDownload now
How to create 1:1 customer experiences at scale
Meet the technology capable of delivering the personalisation your customers craveDownload now
How to achieve daily SAP releases
Accelerate the pace of SAP change to support your digital strategyDownload now