Penetration Testing is Dead
Traditional Penetration Testing has been successfully delivered for over two decades, by the very capable UK Cyber Security industry and certainly has its place. However, its limitations need to be fully understood by those who commission it.
If a new system or application is being delivered which has very little reliance on existing systems in your enterprise then it is absolutely the right answer to test it in microcosm via a tightly scoped, change-focused, penetration test. This is because the results of a penetration test will give you a complete and definitive view of the cyber posture of the tested system. In essence, it will either be good to go or will need some remedial work. The problem space is well defined.
Penetration testing may still be the most appropriate approach if the system is not fully compartmentalised and has interactions with other systems, such as Active Directory. The type and extent of testing selected should be based on the criticality of the system and the data it contains.
Should the system, or the data it holds be at all critical to the business, then it may be more appropriate to undertake an adversary simulation ‒ colloquially called a “Red Team” exercise.
Red Teaming is a much more holistic approach. Instead of looking at the target system in relative isolation, it looks to simulate how attackers will actually go about attacking an organisation. There is nothing more realistic than this and it allows defenders to “train as you fight” providing them valuable experience with how an actual attack may manifest in their business.
We’ll be talking about Red Teaming in an upcoming webinar you can sign up for here.
Our cyber security testing team will work with the customer to define a highly realistic scenario, based on the exact threats that keep their senior cyber practitioners up at night. We then set about simulating an end-to-end attack which is designed to realise that nightmare. The phases can include:
- Surveillance of the organisation
- Gaining an initial foothold (be this in the physical or cyber sphere)
- Building command and control channels
- Prosecuting the attacker’s objectives
- Egress of data
During the exercise both technological controls and staff behaviours can be assessed to determine if issues are most likely to exist in the technology or training realm.
Often it is not the case that wholesale change or massive investment is required to fix the holes in your cyber security systems. Small tweaks to existing configurations or processes can have demonstrable effects on the chance of an attacker gaining access to your organisation’s crown jewels.
While such an exercise sounds expensive and all-consuming, it needn’t be. As well as delivering our class-leading Advanced Intrusion Testing service, for large enterprise customers we also offer Cyber Intrusion Exercises tailored to the needs and budgets of small to medium enterprises. This new service means we can provide a full spectrum of capability at an appropriate price whether your organisation has tens or thousands of seats.
If you want to learn more about how our Red Teaming exercises are conducted, we are going to be presenting real life examples and discussing the issues during our forthcoming webinar ‘Red Teaming – Hacking (organisations) from the hotel’ on the 25th November 2020. Sign up here.
Zero Waste Week
05 Sep 2022
Expression of Interest Futures Lab - Expeditionary Water Generation and Recycling
22 Aug 2022
Successful demonstration of flight model interaction with an airflow disturbance field
09 Aug 2022
Bringing context into our conversations with ‘Intelligent’ Digital Assistants
29 Jul 2022
Learning from the Hoverfly improves drone detection
27 Jul 2022