SUBSCRIBE

Only do penetration tests if your security program is up to it, say experts

Penetration testing is an exam that cyber security experts tout for finding out the true strengths and weaknesses of an organizationโ€™s personal and technology defences.

However, if your organization doesnโ€™t have a mature security program pen testing is a waste of time and money, two veterans warned infosec pros Tuesday at the annual SecTor cyber security conference in Toronto.

It was one of dozens of pieces of advice presenters Tim West, chief risk officer of Saint Louis-based Atredis Partners, and Mark Baseggio, a Toronto-based security consultant gave that CIOs, CISOs and purchasing officers could find handy.

Mark Baseggio, left, and Tim West. Photo by H. Solomon
Mark Baseggio, left, and Tim West. Photo by H. Solomon

In an interview later West and Baseggio expanded on this and other points.

โ€œIf you have a very immature security program and you know it โ€“ which most clients do โ€“ then thatโ€™s a very clear indication you should probably put your money into the building blocks that make you secure rather than a shot in the dark,โ€ said Baseggio. โ€œYou already know your network is insecure because you havenโ€™t put any effort into it.โ€

Hiring a consultant to do a pen test โ€œbecause itโ€™s a popular thing โ€ฆ youโ€™re just not going to get that much value,โ€ agreed West.

Also, they advise not investing in a pen test if the organization doesnโ€™t have a threat model and understand the threats it regularly faces. That leads to disagreements on whether a particular test is relevant to the company. โ€œIf you donโ€™t know what matters to you from a security perspective how are you making decisions to invest in security?โ€ asks West.

โ€œPeople jump to the gun on scoping the pen test based on โ€˜You got Web apps? Do you want phishing? How many IPs do you have? What kind of apps were you testing?โ€™ said West.โ€ But the questions should be what are the types of attacks that are relevant to your business. That will lead to which applications to test, which subnets, which users if social engineering is being used.

The biggest mistake organizations make when looking for a pen testing service is โ€œbuying based on factors that arenโ€™t necessarily related to value โ€“ buying based on brand, size, or other things that in our industry donโ€™t directly deal with buying from an expert,โ€ said West. Itโ€™s easy to buy from a large IT or financial accounting firm, he said, but that comes at a cost. โ€œWithout really scruitinizing and trying to understand the marketplace its easy to make bad decisions.โ€

Similarly, they advise not hiring a pen testing firm if you donโ€™t have a threat model.

Look for experts that will try to solve the particular problems the organization has. โ€œUltimately when youโ€™re buying security consultancies what matters is the people that are going to be on your project,โ€ West said, โ€œwhich is as important if not more than the name on front of the page.โ€

โ€œRegardless of size (of the contracting firm), know who is going to do the project and vetting that individual is going to get you the biggest bang for the buck.โ€

And donโ€™t forget to check the consultantโ€™s references, West and Baseggio add. โ€œItโ€™s bothersomeโ€ that few clients do,โ€ said West.

Ideally the consultant will offer three reference customers that are in a similar industry with a similar testing project. โ€œWith the weeks and hours that you spend in the procurement process, the referral activity probably takes you two hours of your life at most and itโ€™s the most valuable two hours you can spend.โ€

And donโ€™t worry about candor, says West. Most CIOs when talking one on one are โ€œwildly open.โ€

Ask what went well, what went poorly, did they stay on budget, manage expectations well, did they communicate well, did the deliverables meet expectations, how much value did you get, would you spend that amount again.

Most organizations wrongly believe a pen test is a pass/fail exercise, they said โ€“ and worry that a โ€œfailโ€ could damage a regulatory compliance audit. The problem is the organization doesnโ€™t have a risk management program or an understanding of risk in general for security, West said, so any โ€œfailโ€ in the report can lead to argument because the organization sees it as a sign of weakness. โ€œIn reality everyone has information security risk today,โ€ says West, โ€œit just depends on how youโ€™re managing it.โ€

The consultant has to make clear there will be vulnerabilities found, agreed Baseggio. โ€œPen testers donโ€™t always frame vulnerabilities properly,โ€ he admitted. โ€œSometimes we put high on this and make it seem like itโ€™s the end of the world, but in the context of their business itโ€™s not really that important.โ€

For more information see theย Penetration Testing Standard.

Tech Jobs

Categories