The latest issue of CRYPTO-GRAM had a number of interesting articles,
and in particular, one regarding penetration testing. Those of you who
attended the SANs training recently will recall Eric Cole mentioning
many times his company doing pen testing. Here is the article, for those
of you who don't subscribe to CRYPTO-GRAM.
** *** ***** ******* *********** *************
Is Penetration Testing Worth It?
There are security experts who insist penetration testing is essential
for network security, and you have no hope of being secure unless you
do
it regularly. And there are contrarian security experts who tell you
penetration testing is a waste of time; you might as well throw your
money away. Both of these views are wrong. The reality of penetration
testing is more complicated and nuanced.
Penetration testing is a broad term. It might mean breaking into a
network to demonstrate you can. It might mean trying to break into a
network to document vulnerabilities. It might involve a remote attack,
physical penetration of a data center or social engineering attacks. It
might use commercial or proprietary vulnerability scanning tools, or
rely on skilled white-hat hackers. It might just evaluate software
version numbers and patch levels, and make inferences about
vulnerabilities.
It's going to be expensive, and you'll get a thick report when the
testing is done.
And that's the real problem. You really don't want a thick report
documenting all the ways your network is insecure. You don't have the
budget to fix them all, so the document will sit around waiting to make
someone look bad. Or, even worse, it'll be discovered in a breach
lawsuit. Do you really want an opposing attorney to ask you to explain
why you paid to document the security holes in your network, and then
didn't fix them? Probably the safest thing you can do with the report,
after you read it, is shred it.
Given enough time and money, a pen test will find vulnerabilities;
there's no point in proving it. And if you're not going to fix all the
uncovered vulnerabilities, there's no point uncovering them. But there
is a way to do penetration testing usefully. For years I've been saying
security consists of protection, detection and response--and you need
all three to have good security. Before you can do a good job with any
of these, you have to assess your security. And done right, penetration
testing is a key component of a security assessment.
I like to restrict penetration testing to the most commonly exploited
critical vulnerabilities, like those found on the SANS Top 20 list. If
you have any of those vulnerabilities, you really need to fix them.
If you think about it, penetration testing is an odd business. Is there
an analogue to it anywhere else in security? Sure, militaries run these
exercises all the time, but how about in business? Do we hire burglars
to try to break into our warehouses? Do we attempt to commit fraud
against ourselves? No, we don't.
Penetration testing has become big business because systems are so
complicated and poorly understood. We know about burglars and
kidnapping
and fraud, but we don't know about computer criminals. We don't know
what's dangerous today, and what will be dangerous tomorrow. So we hire
penetration testers in the belief they can explain it.
There are two reasons why you might want to conduct a penetration test.
One, you want to know whether a certain vulnerability is present
because
you're going to fix it if it is. And two, you need a big, scary report
to persuade your boss to spend more money. If neither is true, I'm
going
to save you a lot of money by giving you this free penetration test:
You're vulnerable.
Now, go do something useful about it.
This essay appeared in the March issue of "Information Security," as
the
first half of a point/counterpoint with Marcus Ranum.
http://informationsecurity.techtarget.com/magItem/0,291266,sid42_gci1245619,00.html
or http://tinyurl.com/yrjwol
Marcus's half:
http://www.ranum.com/security/computer_security/editorials/point-counterpoint/pentesting.html
or http://tinyurl.com/23ephv
** *** ***** ******* *********** *************
|