Boardroom-Ready & Audit-Ready Penetration Test

1y ago
9 Views
2 Downloads
701.94 KB
9 Pages
Last View : 27d ago
Last Download : 3m ago
Upload by : Maxton Kershaw
Transcription

Header Page 2 of 11 Pg. 2 of 9 Table Of Contents What Is A BR/AR Penetration Test?.3 Choosing the right penetration testing provider can be critical to the success of a security program.3 Step #1: Does The Penetration Test Provider Understand Your Compliance Requirements?.4 PCI DSS.4 HIPAA.5 Other Compliance Requirements.5 Step #2: Can The Penetration Test Provider Deliver A Boardroom-Ready Report?.6 Step #3: Does The Penetration Test Provider Include Remediation Validation?.7 Penetration Test Buyer’s Checklist.8 Contact Cerberus to help protect and secure your environment Contact Us at: ation/ Copyright Cerberus Sentinel 2022. All Rights Reserved. 6900 E. Camelback Road, Suite 240, Scottsdale, AZ 85251 1-480-389-3444 www.cerberussentinel.com

Header Page 3 of 11 Pg. 3 of 9 What Is A BR/AR Penetration Test? Choosing the right penetration testing provider can be critical to the success of a security program. Imagine spending thousands of dollars on a PCI penetration test, only to find out, come audit time, that the penetration test does not meet PCI requirements. IT organizations with an inadequate PCI penetration test can be hit with fines, findings of non-compliance, and even higher liability burdens. The IT leaders are often the ones left holding the bag when the penetration test does not live up to its promise. Imagine getting a penetration test report that is lengthy or overly technical and has to be interpreted for your board or executive management body. When IT leaders don’t fully understand the penetration test report, executive leaders can come away with misunderstanding and a false sense of security. An executive body that lacks understanding of the security program will have unrealistic expectations placed on IT leaders and will lead to a security program that is reactive in nature. Instead, what if we were to tell you that there are three simple steps to follow in the penetration testing process to ensure your penetration test will be boardroom-ready and audit-ready (BR/ AR)? What does this really mean? A BR/AR penetration test report will meet these two criteria: 1. It will meet your compliance requirements (e.g. HIPAA, PCI, NERC CIP, FFIEC) for technical testing. 2. It will be easily interpreted by executive management. Simple, right? It might surprise you that most penetration test providers do not deliver a BR/AR penetration test. In our experience of building highly effective security programs for over a decade, we have seen very bad penetration test reports that miss the mark entirely, and we have seen others that meet one of these two criteria. It takes a company that is truly invested in your long-term success with a proven track record of building highly effective security programs to deliver a BR/AR penetration test. In this whitepaper, we will show you the step-by-step process to ensure your next penetration test is boardroom-ready and audit-ready (BR/AR). As a bonus, at the end of this whitepaper, we have compiled a penetration testing buyer’s guide that will help you identify the best penetration test provider. Copyright Cerberus Sentinel 2022. All Rights Reserved. 6900 E. Camelback Road, Suite 240, Scottsdale, AZ 85251 1-480-389-3444 www.cerberussentinel.com

Header Page 4 of 11 Pg. 4 of 9 Step #1: Does The Penetration Test Provider Understand Your Compliance Requirements? A quality penetration test provider will understand how a penetration test will help you meet your compliance requirements. A simple test of the vendor can quickly help you ferret out companies who do not understand your specific compliance needs. PCI DSS If you are required by the PCI DSS to perform penetration testing, ask the penetration test provider one of the following Red Flag questions, Question #1: “To meet requirement 11.3.2 of the PCI DSS, can we conduct the internal penetration test from inside the perimeter of the card holder data environment (COE)?” Red Flag Answer - Yes Correct Answer - To meet requirement 11.3, you must perform the internal penetration test from the perspective of an out-of-scope LAN segment that has access to the COE perimeter. A penetration test performed within the COE cannot be used to meet requirement 11.3. Question #2: “If we have an antivirus management server outside the COE that manages antivirus agents installed on systems inside the COE, does the antivirus server need to be included in the internal penetration test scope?” Red Flag Answer - No Correct Answer - Critical systems or those systems that may impact the security of the COE should be included in the scope of the penetration test. The antivirus management server has the ability to affect the security of systems inside the COE, so it should be considered a “critical system” and should be included in scope. Copyright Cerberus Sentinel 2022. All Rights Reserved. 6900 E. Camelback Road, Suite 240, Scottsdale, AZ 85251 1-480-389-3444 www.cerberussentinel.com

Header Page 5 of 11 Pg. 5 of 9 HIPAA If you have HIPAA compliance requirements, ask the penetration test provider one of the following Red Flag questions, Question #1: “Does a penetration test help meet HIPAA compliance requirements?” Red Flag Answer - Penetration testing does not support HIPAA compliance Correct Answer - Penetration testing can help meet the Technical Evaluation requirement of HIPAA implementation specification §164.308(a)(8). Question #2: “In order to support the Technical Evaluation requirement of HIPAA (§164.308(a)(8)), does it matter what the scope of the penetration test is?” Red Flag Answer - No Correct Answer - To support the Technical Evaluation requirement of HIPAA, the scope of your penetration test must include assets that can store, receive, maintain, or transmit electronic protected health information. For instance, a PCI penetration test that does not include any HIPAA-related assets cannot be used to support the Technical Evaluation requirement. Other Compliance Requirements Question #1: “Does a penetration test help meet X compliance requirements?” Where X is your specific compliance requirement. Red Flag Answer - Penetration testing does not support X compliance. Correct Answer - Penetration testing usually supports compliance requirements even if not specifically required. If you are curious about your specific compliance environment, please contact Cerberus Sentinel to discuss. should be included in scope. Copyright Cerberus Sentinel 2022. All Rights Reserved. 6900 E. Camelback Road, Suite 240, Scottsdale, AZ 85251 1-480-389-3444 www.cerberussentinel.com

Header Page 6 of 11 Pg. 6 of 9 Step #2: Can The Penetration Test Provider Deliver A Boardroom-Ready Report? It is important that the results of a penetration test be easily understood by executive management and the board. If you need a CISSP to understand the report, it will be of little value to executive management unless you spend effort to translate the report. And even then, you run the risk of misrepresenting the facts and more of the burden is placed on your shoulders. Instead, a penetration test provider should deliver results that are easily understood by executive management bodies. Even if your current executive management body is not in the loop on security, having a boardroom-ready report will be extremely helpful the day they are brought into the loop. More and more boards are becoming involved in security oversight. You will want to prepare yourself for this shift if it hasn’t yet occurred at your company. To evaluate a penetration test provider’s reporting, first request a sample report. Here are some Red Flags to look out for: 1. The penetration test provider is unable/unwilling to provide a sample report. 2. Identified findings do not have an assigned risk/severity score. 3. The sample report does not contain an executive summary with an overall risk rating and detailed definitions for the risk levels. 4. The report does not contain a testing narrative and methodology 5. The executive summary is not easily understood by a non-technical audience. 6. The penetration test provider does not offer an executive presentation at the conclusion of the engagement. A boardroom-ready penetration test report will contain an executive summary that gives a high -level summary of the engagement and overall risk of each engagement component. The report itself will have a risk/severity score assigned to each finding so that remediation actions can be prioritized. Copyright Cerberus Sentinel 2022. All Rights Reserved. 6900 E. Camelback Road, Suite 240, Scottsdale, AZ 85251 1-480-389-3444 www.cerberussentinel.com

Header Page 7 of 11 Pg. 7 of 9 Step #3: Does The Penetration Test Provider Include Remediation Validation? Many penetration test providers simply conclude the engagement upon delivery of the final report. What if their recommendations are not clear? What if the IT provider attempts to correct the vulnerability, but opens up another vulnerability in the process? The IT provider may not identify these issues until the next penetration test, leaving the organization exposed to additional risk. Look for a penetration test provider that includes remediation validation after report delivery. This will allow IT providers to validate that remediation activities were successful. Ensure the penetration test provider will update the report to reflect the new risk profile. This will give you documented third-party evidence that remediation was successful, simplifying your paperwork. A post-remediation report will provide a higher level of assurance to auditors and your executive management and it will also demonstrate that the IT organization is doing its due diligence to promptly correct identified vulnerabilities. Don’t Struggle Alone Request a Consultation Contact Cerberus to help protect and secure your environment Contact Us at: ation/ Copyright Cerberus Sentinel 2022. All Rights Reserved. 6900 E. Camelback Road, Suite 240, Scottsdale, AZ 85251 1-480-389-3444 www.cerberussentinel.com

Header Page 8 of 11 Pg. 8 of 9 Penetration Test Buyer’s Checklist Does the vendor. Understanding your compliance requirements (Step #1)? Deliver a boardroom-ready report Offer remediation validation after report submission and issue a post-remediation report to reflect updated risk profile (Step #3)? Provide a sample report? Include an executive summary in their report with an overall risk ranking for each engagement component? Assign a risk rating for each identified vulnerability? Include a testing narrative and methodology in the report Deliver reports with highly actionable recommendations? Have a proven track record for building highly effective security programs? Present findings to executive and management bodies? Have expertise in web application penetration testing? Conduct manual testing & not solely rely on automated scans? Conduct testing remotely to minimize your burden? Ensure all false positives are removed from the report? Offer penetration testing as a component of a risk assessment? Offer targeted attack simulation (e.g. phishing emails or phone calls used in conjunction with the penetration test)? Offer client references from similar companies? Copyright Cerberus Sentinel 2022. All Rights Reserved. 6900 E. Camelback Road, Suite 240, Scottsdale, AZ 85251 Vendor A Vendor B Cerberus 1-480-389-3444 www.cerberussentinel.com

About Cerberus Sentinel We maintain a global, top-tier bench of cybersecurity and compliance experts who specialize across numourous industries and compliance frameworks. Our technology egnostic approach offers the most innovative solutions to protect your organization against continuing and emerging security threats and compliance obligations. Security Testing Services & Audit & Risk Advisory Services SECUR ITY PR OG R SECU RIT YT ES TI MENT LOP VE DE RV IC AS A T RE A S UC U SE TR Secure Operations Advanced Firewall Management Patch & Vulnerability Management Cloud Professional Services Risk Assessments Managed Risk and Compliance Compliance Audits PCI QSA Services Security Awareness Training E INFR Secured Infrastructure G N N ATIO LID VA AM Penetration Testing Red Team Purple Team Secure Code Review Vulnerability Assessments SU PP O RT SEC UR I TY Security Operations Center MDR XDR SIEM SOCaaS Incident Response 1-480-389-3444 6900 E. Camelback Road Scottsdale, AZ 85251 Copyright Cerberus Sentinel 2022. All Rights Reserved.

A quality penetration test provider will understand how a penetration test will help you meet your compliance requirements. A simple test of the vendor can quickly help you ferret out companies who do not understand your specific compliance needs. PCI DSS If you are required by the PCI DSS to perform penetration testing, ask the penetration test

Related Documents:

PSI AP Physics 1 Name_ Multiple Choice 1. Two&sound&sources&S 1∧&S p;Hz&and250&Hz.&Whenwe& esult&is:& (A) great&&&&&(C)&The&same&&&&&

Argilla Almond&David Arrivederci&ragazzi Malle&L. Artemis&Fowl ColferD. Ascoltail&mio&cuore Pitzorno&B. ASSASSINATION Sgardoli&G. Auschwitzero&il&numero&220545 AveyD. di&mare Salgari&E. Avventurain&Egitto Pederiali&G. Avventure&di&storie AA.&VV. Baby&sitter&blues Murail&Marie]Aude Bambini&di&farina FineAnna

The program, which was designed to push sales of Goodyear Aquatred tires, was targeted at sales associates and managers at 900 company-owned stores and service centers, which were divided into two equal groups of nearly identical performance. For every 12 tires they sold, one group received cash rewards and the other received

College"Physics" Student"Solutions"Manual" Chapter"6" " 50" " 728 rev s 728 rpm 1 min 60 s 2 rad 1 rev 76.2 rad s 1 rev 2 rad , π ω π " 6.2 CENTRIPETAL ACCELERATION 18." Verify&that ntrifuge&is&about 0.50&km/s,∧&Earth&in&its& orbit is&about p;linear&speed&of&a .

The quality audit system is mainly classified in three different categories: i Internal Audit ii. External Audits iii. Regulatory Audit . Types Of Quality Audit. In food industries all three audit system may be used to carry out 1. Product manufacturing audit 2. Plant sanitation/GMP audit 3. Product Quality audit 4. HACCP audit

theJazz&Band”∧&answer& musical&questions.&Click&on&Band .

6" syl 4" syl 12" swgl @ 45 & 5' o.c. 12" swchl 6" swl r1-1 ma-d1-6a 4" syl 4" syl 2' 2' r3-5r r4-7 r&d 14.7' 13' cw open w11-15 w16-9p ma-d1-7d 12' 2' w4-3 moonwalks abb r&d r&d r&d r&d r&d r&d ret ret r&d r&d r&d r&d r&d 12' 24' r&d ma-d1-7a ma-d1-7b ret r&d r&d r5-1 r3-2 r&d r&r(b.o.) r6-1r r3-2 m4-5 m1-1 (i-195) m1-1 (i-495) m6-2l om1-1 .

INTERNAL AUDIT Example –Internal audit report [Short Client Name] Internal Audit Report Rev. [Rev Number] STEP ONE: Audit Plan Process to Audit (Audit Scope): Audit Date(s): Lead Auditor: Audit #: Auditor(s): Site(s) to Audit: Applicable Clauses of [ISO 9001 or AS9100] S