Vulnerability Scanning Vs. Penetration Testing – When To Perform?
Individuals are often confused regarding the difference between vulnerability scanning and penetration testing. Both activities are part of cybersecurity best practices, and vulnerability scanning always comes before penetration testing.
Vulnerability scanning searches for weaknesses in an asset or system that could, potentially, be exploited by a bad actor. As an analogy, vulnerability scanning is akin to seeing if a window or door is unlocked on a house, but not entering the house. It is a passive activity.
Penetration testing exploits the potential weakness (identified during vulnerability scanning) to determine the degree to which a malicious attacker could gain access to an asset or system. Using the analogy of a house, a penetration tester attempts to open the unlocked window or door and take a step into the house.

When to Perform Vulnerability Scanning Vs. Penetration Testing
Performing both vulnerability scanning and penetration testing is the most robust and assured way to insure an environment is properly configured to safeguard against malicious attackers. Performing vulnerability scanning routinely (monthly, weekly, daily) is a best practice, and performing penetration testing annually, at a minimum, is prudent.

Can Penetration Testing Help with Regulatory Compliance?
In a single word, yes. For many organisations, contractual requirements and statutory obligations compel organisations to perform penetration tests periodically by an independent entity such as Allendevaux & Company. Regulations such as the General Data Protection Regulation or California’s Consumer Privacy Act require enterprises to demonstrate due care and due diligence in terms of validating data protection best practices, and penetration testing is the ultimate form of assurance. Many sector-specific domains also require penetration testing by statutory obligation, including PCI DSS, healthcare, finance and banking.
My Data is Contained in AWS or Azure. Why is Penetration Needed?
While Amazon Web Services or Microsoft Azure hosts a company’s data, it is usually the software running within AWS or Azure that is vulnerable to attack. It is necessary to vulnerability scan and penetration test any new release of software in order to provide “sufficient guarantees” that the system does not contain an unknown security hole or weakness that could be exploited by a malicious attacker.
What Types of Assets or Systems Should be Penetration Tested?
Any asset or system that collects, stores, processes and transmits confidential and sensitive information such as company secrets or personal information should be tested. Cloud service providers should test cloud environments and systems supporting operations. Financial institutions should test banking and financial services systems, including the portals that customers and partners access. Hospitals should test all internal and external systems associated with critical hospital operations and functionality, including any systems that store and process patient data. The practitioners at Allendevaux & Company can help your organisation identify and prioritise your approach.
What approach does the Allendevaux & Company take for penetration planning and testing?
The cybersecurity practitioners at Allendevaux & Company approach cybersecurity assurance by using the NIST Cybersecurity Framework or ISO/IEC 27032 best practices. Both are highly recognized standards, and often NIST is used for United States centric activity whilst ISO/IEC 27032 is employed for international engagements.
What certifications does the team at Allendevaux & Company hold and maintain?
The cybersecurity team is comprised of a diverse team of highly experienced professionals, holding industry recognized certifications in security and compliance, white hacking, data analytics and auditing. Education and certifications including OSCP, CIPP/US, CIPT, HCISPP, CIS LI, CIS LA, CIPM and others.
Contact Allendevaux & Company toknow more about Penetration or Pen Test Services.


Comments
Post a Comment