May 11, 2016 By Kevin Beaver 2 min read

Given the importance of information security testing — including vulnerability scanning, vulnerability assessments and penetration testing — I find it interesting how little thought goes into the actual scoping of such work. Quite often, the scope of security testing has too many constraints.

Struggling With Scope

In large enterprises, for example, there’s often interest in conducting an external penetration test or perhaps focusing specifically on one or two core Web applications. That’s all fine and good. However, the problem is that the entire environment is not being fully assessed. In fact, I have worked in many large enterprise environments where a comprehensive security assessment has never been performed.

It’s often a similar situation in midmarket enterprises: They will want to do external security testing but perhaps not look at the internal environment. This goes for on-premises LAN/WAN systems as well as systems in the cloud.

If there’s any group of businesses that seems to do things well, it’s small businesses such as cloud service startups, health care providers and nonprofit organizations. Perhaps the tighter scope and smaller budget allow these organizations to look more closely at everything across the board.

At the end of the day, regardless of the organization’s size, that’s exactly what needs to be assessed: everything.

What Goes Into Security Testing?

There is no right or wrong answer to the question of how to perform ongoing security testing in your organization — unless critical systems and related business requirements are being overlooked. Unfortunately, I’m convinced that’s often the case.

Don’t get me wrong; I’m not naïve enough to think organizations have an unlimited budget to do the most thorough and comprehensive security testing. The economics of security don’t work that way. The problem that I’m seeing is that these organizations are claiming to be secure and signing contracts stating that they’re testing their environments. Yet what they are claiming hasn’t been done.

If you’re in charge of information security in your organization, you have to be careful about how you approach this. You don’t want to skim the surface of your environment, and you certainly don’t want to over-commit to doing everything if you’re not equipped for it. Know what you’re signing up for, what your committing to and for what you’re being held accountable.

Recommendations for Professionals

Make sure that there are checks and balances in place between those writing the requirements and running the project as well as others who are requesting that the work be done, such as auditors and management. If an outsider such as a consultant or security firm recommends that you do things a bit differently — perhaps adding in more systems to test or testing things in different ways to ensure that you get the best results — heed that advice. It could be that one nugget that ultimately prevents a breach down the road.

You have to ask yourself: What is my goal? Perhaps the goal is to determine whether specific systems or applications are secure. Maybe the goal is to ensure that all external-facing systems are in check. Or it could be to ensure that all systems are being tested so you can get a true measurement of your information risk. In all but the oddest of cases, it should eventually be the latter.

Read the interactive white paper: Preempt attacks with programmatic and active testing

More from Risk Management

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Cybersecurity dominates concerns among the C-suite, small businesses and the nation

4 min read - Once relegated to the fringes of business operations, cybersecurity has evolved into a front-and-center concern for organizations worldwide. What was once considered a technical issue managed by IT departments has become a boardroom topic of utmost importance. With the rise of sophisticated cyberattacks, the growing use of generative AI by threat actors and massive data breach costs, it is no longer a question of whether cybersecurity matters but how deeply it affects every facet of modern operations.The 2024 Allianz Risk…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today