In-depth

Penetration testing: an enterprise guide

Davey Winder investigates the role of penetration testing within the enterprise: What is it and why do you need it?

Given the ever increasing number of risks to your data, getting your network security strategy right is more important than ever.

What is it?

What does penetration testing actually mean? As the Assessment Practice Manager at Rapid7, Jack Daniel heads up the penetration testing professional services unit for the company. Daniel defines penetration testing, more commonly known within the IT Security community as pen testing or ethical hacking, as being "a manual, time-limited test emulating how a malicious individual would attack your environment with an end goal insight."

While most assessments are based on some measure of quantitatively scored risk, which is theorised and weighted on a number of factors, penetration testing executes attacks from a real-world attacker's perspective to highlight what the real risks are.

Advertisement
Advertisement - Article continues below

This begs the question of what the end goal is. It's not quite so simple to define, but the list may include such things as intellectual property, financial records, personal identifiable information (PII) or even an attempt to defame the organisation through service outages, defacing digital property or some other shaking of consumer confidence. "A penetration test does what no other assessment can," Daniel explains. "It tests your susceptibility to an attack."

So, while most assessments are based on some measure of quantitatively scored risk, which is theorised and weighted on a number of factors, penetration testing executes attacks from a real-world attacker's perspective to highlight what the real risks are.

Do you need it?

Kate Craig-Wood, managing director of Memset, knows a thing or two about penetration testing from the enterprise side of the fence as her organisation has been there, done that and can wear the 'We have been pen tested'  T-shirt. IT Pro asked her how Memset went about this and whether every enterprise should be following her lead...

 "We initially contacted a CREST consultancy, Trusted Management, who advised us which pen tests we should be doing and then they recommended Incryption to us who are part of the Tiger scheme, who worked with us to help design the tests and carry them out," Craig-Wood said.

As for which enterprises should be thinking about doing the same, is the answer really as simple as 'anyone who holds value in their data' or is it a little more complex? After all, ISO 27001 as a whole does not specifically state that penetration testing is a requirement for certification, for example.

"It's a great add-on and can certainly help you to prove that your systems are protected from fraudulent activity or unauthorized disclosure," Craig-Wood argues. And, as for any enterprise looking to work with government, now that G-Cloud has come into play, they will need to undergo some level of pen testing.

"Even if you're operating at the low end IL1 and IL2 levels and it need not be that sophisticated either, we simply set up an account, gave the hackers access to a Miniserver VM - which they used to attack other machines  - and so on," Craig-Wood insists. If you are operating at IL3 or in finance or a large corporation, then pen testing would be pretty much mandatory. What it need not be is prohibitively expensive. "It's worth spending the money to have your systems checked and you shouldn't be spending much more than 2-3K to undergo pen testing," Craig-Wood concludes "If you are, look for someone else who is CESG approved or part of the Tiger scheme."

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Most Popular

Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/operating-systems/microsoft-windows/354297/this-exploit-could-give-users-free-windows-7-updates
Microsoft Windows

This exploit could give users free Windows 7 updates beyond 2020

9 Dec 2019
Visit/hardware/354237/five-signs-that-its-time-to-retire-it-kit
Sponsored

Five signs that it’s time to retire IT kit

29 Nov 2019