{"id":11343,"date":"2017-06-07T16:54:08","date_gmt":"2017-06-07T11:24:08","guid":{"rendered":"https:\/\/cigniti.com\/blog\/?p=11343"},"modified":"2019-07-31T16:07:43","modified_gmt":"2019-07-31T10:37:43","slug":"invest-vulnerability-assessment-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.cigniti.com\/blog\/invest-vulnerability-assessment-penetration-testing\/","title":{"rendered":"Why to invest in Vulnerability Assessment and Penetration Testing?"},"content":{"rendered":"
Cyber Security \u2013 A Matter of Concern<\/strong><\/p>\n Cyber security has become more of a concern for almost every service organization. But are we doing enough to protect our intellectual properties and sensitive information? The following stats present a grim picture: 52% of organizations that suffered successful cyber-attacks in 2016 aren’t making any changes to their security in 2017.<\/p>\n Why? Primarily a lack of additional budget or a decrease in the budget makes a change in protection a harder sell.<\/p>\n Vulnerability Assessment, Penetration Testing and ISO 27001<\/strong><\/p>\n Per ISO 27000 (international standard entitled: Information technology \u2014 Security techniques \u2014 Information security management systems \u2014 Overview and vocabulary):<\/p>\n A vulnerability arises when a threat finds a weakness it can exploit. Weaknesses usually creep in due to lack of attention, ignorance or in some cases intentional as well. Few of these weaknesses are easy to recognize\/detect, fix, exploit, whereas others may require some dedicated time, effort, tools and resources.<\/p>\n Penetration testing<\/strong> (often called \u201cpen testing\u201d or \u201csecurity testing\u201d) simulates a malicious attack to establish whether your internet security is acceptable, is functioning the way it should, and will resist any external threats.<\/p>\n Vulnerability Assessment and Penetration Testing (VAPT) is an essential element in ISO 27001 Information Security Management System (ISMS). ISO 27001 control objective A12.6 (Technical Vulnerability Management) states that \u2019information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization\u2019s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk\u2019.<\/p>\n What should you choose? VA or PT or both?<\/strong><\/p>\n A vulnerability assessment\/analysis is the process of identifying, quantifying, and prioritizing (or ranking) the vulnerabilities in communications infrastructures, networks, or computers. Vulnerability assessment is like the classical risk analysis where the primary focus is on the identification of risks and then dealing with mitigation and contingency.<\/p>\n On the other hand, Pen Tests are authorized simulated attacks on identified computer systems and check the system for any security loopholes\/weaknesses that may be used to gain access to the system’s sensitive data and\/or information. Penetration testing is a highly recommended best practice that helps understand how vulnerable your systems are.<\/p>\n When we perform a vulnerability analysis on any information systems, we can identify all technical vulnerabilities related to them like SQL Injection (code injection technique that might destroy your databases), XSS (Cross-site scripting – type of injection, in which malicious scripts are injected into otherwise benevolent and trusted websites), weak passwords, etc. But, for their further exploitation, we need to perform a penetration test. Effective penetration testing involves the simulation of a malicious attack against the system under test, often using a combination of methods and tools, and is conducted by a certificated, ethical professional tester. This further translates into a VAPT report which provides a basis upon which security measures can be improved.<\/p>\n Per ISO 27001 control A.12.6.1, we need to prevent the exploitation of technical vulnerabilities. Does this mean we only need to deal with Vulnerability analysis and do away with Penetration testing? Because after the vulnerability analysis, if we get to know that the system is vulnerable, and by fixing it we can avoid any data\/information\/IP loss, we can only do vulnerability assessment which means the next step, exploiting it, is not necessary.<\/p>\n This also helps to stay compliant with ISO 27001:2013. One of the recent reports published by Symantec (2017 Internet Security Threat Report) says \u201cOur data found that 76 percent of websites scanned contained vulnerabilities\u2014the same percentage as 2014 and just two percent less than the 2015 figure\u201d.<\/p>\n To cater to the above and needs which go beyond only testing, the answer which probably suits the need of the hour is performing both VA and PT.<\/p>\n The link between Security Testing and ISO 27001\/ISMS<\/strong><\/p>\n ISO 27001 control A.12.6.1 talks about the following key controls:<\/p>\n ISO 27002 (Information technology \u2014 Security techniques \u2014 Code of practice for information security controls), provides the best practices to be considered while implementing control A.12.6.1 \u2013<\/p>\n In Conclusion \u2013 How can Cigniti help?<\/strong><\/p>\n The world’s most famous (historical) hacker Kevin Mitnick says, \u201cYou can never protect yourself 100%. What you do is protect yourself as much as possible and mitigate risk to an acceptable degree. You can never remove all risk\u201d. Basically, if you know what your vulnerabilities are before your attackers do, you will be protected in terms of your information security as there are thousands of people around the world constantly scanning the internet for vulnerable systems that can be broken into easily. Considering this, do not let a lack of additional budget or a decrease in the budget be the criteria for doing away with vulnerability assessment and penetration testing.<\/p>\n Cigniti\u2019s managed security testing services team, Certified Ethical Hackers, and ISMS experts will help you in your ISMS journey. We review your security objectives, your business, regulatory and contractual requirements, and help to perform vulnerability analysis (mandatory in case of ISO 27001 implementation journey) and penetration testing (best practice) for your organization.<\/p>\n For details, contact us<\/a>.<\/p>\n References<\/strong><\/p>\n\n
\n
\n