How to get the most from a penetration test

Penetration tests are among the blunter tools CISOs use to find out weaknesses in their cyber security program. Whether conducted by an internal or external team, a well-conducted pen test will expose ugly realities.

But what’s a well-conducted test? By now most infosec pros know that a test with too many limitations (‘We don’t need to test that: No one would think of attacking us that way’ or ‘We’ve sure this is covered’…) won’t find out very much. However, realistically budget and other restraints may mean some parameters have to be set.

Which is why a column this week by Edward Amoroso, former CSO of AT&T and now chief executive of TAG Cyber LLC, a cyber security consulting firm, will be of interest. He offers five tips for getting the most from a pen test which make a lot of sense.

One of the obvious ones is not allowing the testing team full rein and setting proper limits — like don’t do a denial of service test on a production system.

I won’t run through all Amoroso’s pointers, which are listed here. But I will quote his number one warning. Don’t think that mitigating discovered flows has removed all of them. “Penetration testing – like all testing – is great is showing the presence of errors, but is a terrible means for proving their absence,” he writes. “Never confuse fixes to some penetration test-obtained flaws with security. This is a rookie mistake to avoid at all costs.”

And while pen tests can give a wealth of information about the strength of defences, they are not for every organization. While preparing this I recalled this advice given at a session during last year’s SecTor conference:  “If you have a very immature security program and you know it – which most clients do – then that’s a very clear indication you should probably put your money into the building blocks that make you secure rather than a shot in the dark,” said one speaker. “You already know your network is insecure because you haven’t put any effort into it.”

That’s a tip every infosec leader should consider.

Would you recommend this article?

Share

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.


Jim Love, Chief Content Officer, IT World Canada

Featured Download

Howard Solomon
Howard Solomon
Currently a freelance writer, I'm the former editor of ITWorldCanada.com and Computing Canada. An IT journalist since 1997, I've written for several of ITWC's sister publications including ITBusiness.ca and Computer Dealer News. Before that I was a staff reporter at the Calgary Herald and the Brampton (Ont.) Daily Times. I can be reached at hsolomon [@] soloreporter.com

Featured Articles

Cybersecurity in 2024: Priorities and challenges for Canadian organizations 

By Derek Manky As predictions for 2024 point to the continued expansion...

Survey shows generative AI is a top priority for Canadian corporate leaders.

Leaders are devoting significant budget to generative AI for 2024 Canadian corporate...

Related Tech News

Tech Jobs

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Tech Companies Hiring Right Now