InfoSec-Specific Executive Development for CISOs and Aspiring Security Leaders.
Live Faculty-led instruction and interactive labs to build you and your team's InfoSec skills
Whether you engage a penetration tester to do an internal network penetration test, external network test, source code review, web application test or perhaps even a red teaming engagement, the tester will provide a report with distinct recommendations
designed to be read, absorbed and prioritized for policy, process and operational changes.
This piece explains what to expect from a typical pen-test report and provides a step-by-step plan for using the recommendations outlined in the report to continually reduce risk and improve your security program.
Most pen-test reports begin with an executive section outlining both business and technical risks, followed by specific findings with detailed technical explanations for technical staff to consume. The report should also include a detailed methodology
so technical staff can replicate and verify a finding, as needed.
Although there will be some variation among different information security consultants, you will likely have three specific actionable sections in a penetration test report:
It is important not to interpret a penetration-test report as simply a rundown of software vulnerabilities that need to be patched. While it may include a sub-component of such items, it should be expected the penetration tester will actively exploit
weak processes, policies and misconfigurations, and resort to software vulnerabilities only when nothing else works.
It is also important to understand penetration-testing activities have a specific scope and time period associated with them. Be sure and take that into account and recognize there will likely be blind spots that may not have been covered, due to scope
interpretation or time restrictions.
Consider a postmortem/post engagement discussion after the penetration test is complete. This should occur after all relevant parties have read the report, and at the discretion of the person who commissioned the activity. Considering involving multiple
IT support and security personnel.
The postmortem discussion should focus on the penetration tester’s impressions of your overall environment. Experienced testers should have an intuitive feel for how your operation measures up against the many others they’ve tested in the
Security and IT stakeholders, such as systems administrators, should take advantage of this opportunity to engage the tester and ask questions to clarify recommendations. If they feel a recommendation is unreasonable or unrealistic, consider asking questions
about compensating controls that might be considered. Example questions might include, but should not be limited to:
The key findings of a report are designed to provide an opportunity for the CISO or specific individual commissioning the testing to discuss with IT management about what the findings mean and how they relate to ongoing organizational risk. It is important
to frame this discussion in a context of ongoing information security projects and priorities already identified.
The strategic guidance section, unfortunately, is an area where the reported information may not be as customized to your organization as you would like. A penetration-testing firm is an outside entity that lives within the context of your environment
for only a short period of time. The testers cannot know your specific business pressure points and organizational culture.
If reported well, the strategic guidance section will address the key findings in such a way as to indicate what levers executive management can engage to help facilitate remediation of reported findings. The language may be fairly generalized, for example:
Organizations should consider leveraging the postmortem discussion, key findings and strategic guidance to ultimately re-prioritize or introduce new security priority areas to be addressed. Key findings and strategic guidance may also be a driver for
information security policy changes and employee training program enhancements.
The classic example of a change spurred by a pen test revolves around strengthening authentication, usually implementing a stronger passphrase policy with accompanying 2FA mechanisms. This sort of change impacts policy, procedure, process and training.
The takeaways might also spur different actions depending on the maturity of the security program:
If you find yourself in a situation of shock and surprise, it may be your organization was not ready for the level of penetration testing that occurred. In that case, it may be better to fall back to assessing program maturity and providing recommendations
to build the baseline program items first, before coming back for a repeated penetration-testing effort.
After the information security group and executive discussions are complete, consider the following:
Ultimately, your pen-test results should be used to foster continuous improvement in your defensive security posture. You should understand the reported information reflects an outsider’s lack of familiarity and context, but that it also reveals
potential exploitable weaknesses in your IT operation. When you receive this information, it may be a shock to the system, or it may be a reinforcement of what you already know. Regardless, to ensure you gain the maximum value from your penetration-testing
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
October 19, 2021
By IANS Faculty
Continuous compliance requires continuous monitoring and validation of controls in the environment, as well as integration with governance, risk management and compliance tools and platforms. Understand the processes, tools, stakeholders and focus required for a best practice continuous compliance program.
October 14, 2021
Learn how the DDoS threat is evolving and get a step-by-step playbook to ensure your organization is protected against DDoS attacks and has a response plan in place.
October 12, 2021
Uncertain how to secure your M365 environment? Our Faculty identify and explain the five primary areas of M365 that will provide the best security return-on-investment with the least user experience impacts.