Penetration testing is becoming the vaccinations of the tech industry. Everyone is expected to get one; some don’t believe in them, and others only do it because they are told to. But what is really being purchased?
A pen test follows four basic elements of security:
- Testing Applications, Websites, and Endpoints for security flaws.
- Evaluating the Security of the network and infrastructure.
- Assessing the Security of the physical device.
- Testing the Human Element, such as phishing attacks and red team penetration.
It’s crucial to know vulnerabilities, but once those vulnerabilities have been breached, what roadmap can a hacker make of the environment? When noticing a disparity in pen testing pricing, what questions should be asked?
Often, many services are sold under the title of Penetration Test, such as:
- Vulnerability Scan: Scans for known vulnerabilities and checks if systems are still vulnerable.
- Vulnerability Assessment: Identifies known and unknown vulnerabilities and applies a little pressure to them.
- Pen Test: Identifies vulnerabilities and applies pressure with offensive tactics and techniques that identify risk.
Not all inexpensive tests are necessarily inadequate. It is important to compare apples to apples when evaluating bids and demand what is needed for the company. Sometimes, a Vulnerability Assessment may be more appropriate than a Penetration Test.
For instance, a vulnerability scan is effective for verifying the efficiency of the patch management process and for assessing the hardware inventory, as it can scan the entire network and identify what’s present. However, a vulnerability scan won’t provide insight into how well the firewall is protecting the network—that’s where a more comprehensive penetration test becomes valuable.
Here are a few tips to navigate Pen Testing Inflammation and Pen Testing Inflation:
- Get Quotes for All Three: In sales, this is known as a good, better, best approach. It helps identify the effort being put into the penetration test, even if all three are not needed (a pen test should cover vulnerability assessment and scan).
- Ask for a Sample Report: Review what the pen test will provide upon completion and compare reports to determine if it’s something useful. Assessing how the results will be utilized is crucial in determining the appropriate test.
- Talk to the Engineers: Engage with the engineers who will be conducting the penetration testing. If this capability is not available, reconsider the company. Have them explain their process and what they are looking for, and ask any pertinent questions. They are being interviewed.
Cybersecurity is one of the fastest-growing IT sectors, attracting many who are willing to say what it takes to enter the field. Unqualified professionals should not be the compass for the company’s security. Confidence in one’s own security is essential, and it should not be entrusted to just anyone.