The Price of Business – Pen Testing vs. Vulnerability Assessments

Blog Alias todaySeptember 23, 2024

Background
share close

Penetration testing is becoming the vaccinations of the tech industry. Everyone is expected to get one; some don’t believe in them, and others only do it because they are told to. But what is really being purchased?

A pen test follows four basic elements of security:

  1. Testing Applications, Websites, and Endpoints for security flaws.
  2. Evaluating the Security of the network and infrastructure.
  3. Assessing the Security of the physical device.
  4. Testing the Human Element, such as phishing attacks and red team penetration.

It’s crucial to know vulnerabilities, but once those vulnerabilities have been breached, what roadmap can a hacker make of the environment? When noticing a disparity in pen testing pricing, what questions should be asked?

Often, many services are sold under the title of Penetration Test, such as:

  1. Vulnerability Scan: Scans for known vulnerabilities and checks if systems are still vulnerable.
  2. Vulnerability Assessment: Identifies known and unknown vulnerabilities and applies a little pressure to them.
  3. Pen Test: Identifies vulnerabilities and applies pressure with offensive tactics and techniques that identify risk.

Not all inexpensive tests are necessarily inadequate. It is important to compare apples to apples when evaluating bids and demand what is needed for the company. Sometimes, a Vulnerability Assessment may be more appropriate than a Penetration Test.

For instance, a vulnerability scan is effective for verifying the efficiency of the patch management process and for assessing the hardware inventory, as it can scan the entire network and identify what’s present. However, a vulnerability scan won’t provide insight into how well the firewall is protecting the network—that’s where a more comprehensive penetration test becomes valuable.

Here are a few tips to navigate Pen Testing Inflammation and Pen Testing Inflation:

  1. Get Quotes for All Three: In sales, this is known as a good, better, best approach. It helps identify the effort being put into the penetration test, even if all three are not needed (a pen test should cover vulnerability assessment and scan).
  2. Ask for a Sample Report: Review what the pen test will provide upon completion and compare reports to determine if it’s something useful. Assessing how the results will be utilized is crucial in determining the appropriate test.
  3. Talk to the Engineers: Engage with the engineers who will be conducting the penetration testing. If this capability is not available, reconsider the company. Have them explain their process and what they are looking for, and ask any pertinent questions. They are being interviewed.

Cybersecurity is one of the fastest-growing IT sectors, attracting many who are willing to say what it takes to enter the field. Unqualified professionals should not be the compass for the company’s security. Confidence in one’s own security is essential, and it should not be entrusted to just anyone.

Written by: Alias

Rate it

Previous post

Blog Alias / August 19, 2024

World Class Service on a Local Scale

When we think about the impact of cybersecurity attacks, it’s easy to fall into the trap of believing that data is only as valuable as the ransom a company is willing to pay to retrieve it. We’ve seen this misconception [...]


Similar posts

Blog Tanner Shinn / February 20, 2025

NSA’s Equation Group:  Lessons about our own APT learned from our targets?

As US cybersecurity professionals, we are well-versed in the tactics, techniques, and procedures (TTPs) of advanced persistent threats (APTs) from various countries.  We have detailed indicators of compromise (IOCs) for groups like APT41 from China and APT28 from Russia. However, when it comes to American APTs, the landscape is far murkier.   Beyond some recognition of ...

Read more trending_flat

Blog Alias / January 22, 2025

Proposed HIPAA Security Rule Updates

In recent years, there has been an alarming growth in the number of data breaches affecting 500 or more individuals, alongside an increase in the total number of individuals impacted. Cyberattacks, particularly through hacking and ransomware, have surged in scale and frequency, posing significant risks to healthcare organizations and the sensitive data they manage. The ...

Read more trending_flat