Want to hear a penetration testing joke? No, not this one:
…but this one:
Q: Do you need a pentest done?
A: Not sure … will it make us secure?
On a more serious note, the biggest challenge with tests of anything is of course how you act on the results. It seems that any pentester worth his … ahem … his pen … has seen clients who simply file their reports, and then do nothing until the next year’s test. Guess what the test typically reveals next year? Oh, the mysteries of the Universe … or at least the same mysteries as last year :–)
As we explore the breach and attack simulation (BAS) [sometimes also called threat simulation] tools and ponder broader questions around testing security posture, we encounter mysteries related to acting on the findings of simulations and tests.
For example, lets imagine you used a shiny new BAS tool and it revealed that one can utilize an ICMP tunneling to exfiltrate a file out of your network, without you noticing. Let’s assume this happened despite the fact that you have configured available security tools (firewall, NTA, DLP, etc) in an optimal manner (whatever that means…but let’s not dwell on this here).
- How do you prioritize this finding vs other security action items?
- What is your additional risk due to this finding?
- How do you act on this if your existing tools have just been proven to not stop/detect it?
Indeed, it may be that testing is [relatively] easy, but deciding what to do is hard. BTW, if you recall, some of the same logic applies to threat intel: you may get an advance warning, but can you act on it, do you have the capability or agility to quickly build such capability to act? After all “intelligence does not win wars”…
Blog posts related to testing security research:
- Threat Simulation Call to Action for 2018
- New Research: How to Actually Test Security?
- Threat Simulation – How real does it have to be? (by Augusto)
Read Complimentary Relevant Research
How to Evaluate Cloud Service Provider Security
Security and risk management leaders continue to experience challenges to efficiently and reliably determine whether cloud service providers...
View Relevant Webinars
Securing the Internet of Things: An Architectural and Risk-Driven Approach
Security is a top concern and significant inhibitor to Internet of Things (IoT) adoption. In this Webinar, Erik T. Heidt will identify...
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.