Penetration testing, pen testing or ethical hacking, is the practice of testing a computer system, network or web application's cybersecurity by looking for exploitable security vulnerabilities. Penetration testing can be automated with penetration testing tools or manually by penetration testers.
In essence, penetration testing seeks to answer:
It views your network, application, device and physical security through the eyes of a malicious actor and an experienced security team to uncover weaknesses and identify how your security posture could be improved. It's an important aspect of cybersecurity that all organizations should employ.
Pen testers launch authorized cyber attacks designed to gain access to sensitive information, simulating what a real world attack would target, how your security controls would fare and the magnitude of a potential data breach.
Typically a target system is identified and a particular goal is defined, e.g. to gain access to PII and PHI that would result in a notifiable data breach.
Pen testers then review available information and use various methods to try and meet their goal. For example they may employ SQL injections, phishing and other social engineering attacks, cross-site scripting or exploit vulnerabilities.
Once the penetration test is completed, the security experts provide a security assessment to the owners of the target. The assessment generally outlines the potential impact and countermeasures designed to reduce cybersecurity risk.
Learn the differences between cybersecurity and ethical hacking.
Common areas for penetration testing include:
The goal of a penetration test will depend on the type of approved activity and your compliance requirements. Penetration testing can help organizations:
In the end, the standard goal is to find security issues that could be exploited by an attacker and then sharing this information, alongside relevant mitigation strategies with the target.
While penetration testing can help identify weaknesses in network security, information security, application security and data security, it is only one part of a full security audit.
Penetration testing can be broken down into six stages:
Note that this process can be repeated as the pen tester finds new security issues.
Penetration testing services are generally provided by an outside consultant or internal red team with little-to-no prior knowledge of how the target is secured.
This allows them to expose possible blind posts that are missed by the internal security team.
Penetration testing is important because it helps determine how well your organization is meeting its security objectives.
The purpose of these simulated attacks are to identify weakness in your security controls which attackers could take advantage of.
Penetration testing, and cybersecurity more generally, is becoming more important as we become more reliant on technology to process sensitive information.
As part of a cybersecurity program, penetration testing help you improve the quality of your security controls. It can also help reduce the cost and frequency of downtime, improve mean-time-to-repair (MTTR), protect brand reputation, maintain customer trust, avoid litigation and ensure regulatory compliance.
Security professionals disagree about the importance of penetration testing. Some believe it is the most important thing, others believe it's a waste of time.
As with most security practices, the truth is somewhere in between and its efficacy depends on application and scope.
Pen testing alone is never enough to prevent data breaches but the information gained from it can play a critical role in bolstering your organization's security controls.
While there are numerous frameworks that outline a pen testing process, it remains a broad term that encompasses a slew of different activities designed to identify weaknesses in your cybersecurity.
This could entail the use of specialized security tools such as Kali Linux or Backbox and Metasploit or Nmap to discover and exploit vulnerabilities, carrying out social engineering attacks to test physical controls or employing ethical hackers to simulate cyber attacks.
In the end the goal is the same: to improve your security posture and reduce cybersecurity risk.
Even the most thoroughly tested applications and infrastructure can fall victim to data breaches or data leaks. That is the disheartening truth of cybersecurity – sometimes attackers are one step ahead of your security team.
Furthermore, even the best pen testers can only work with the knowledge and tools at their disposal.
In the case of zero-day exploits, like EternalBlue that led to the WannaCry ransomware worm, the best you can do is respond quickly. Pair this with the fact that third-party vendors are handling more and more sensitive information, and it's not hard to understand that while pen testing is important, it can't be the only thing you do.
To have a lasting impact on the organization, pen testing must be integrated with real-time continuous security monitoring of first, third and fourth-parties.
These tools can automatically detect known vulnerabilities, help mitigate high-risk vulnerabilities, provide ongoing vendor risk assessments and help you scale your vendor risk management efforts.
There are several frameworks and methodologies for conducting penetration tests including:
Companies like Intercontinental Exchange, Taylor Fry, The New York Stock Exchange, IAG, First State Super, Akamai, Morningstar and NASA use UpGuard to protect their data, prevent data breaches, monitor for vulnerabilities and avoid malware.
We're experts in data breaches and data leaks, our research has been featured in the New York Times, Wall Street Journal, Bloomberg, Washington Post, Forbes, Reuters and Techcrunch.
UpGuard Vendor Risk can minimize the amount of time your organization spends managing third-party relationships by automating vendor questionnaires and providing vendor questionnaire templates that map to the NIST Cybersecurity Framework and other best practices. We can help you continuously monitoring your vendors' security posture over time while benchmarking them against their industry.
Each vendor is rated against 50+ criteria such as presence of SSL and DNSSEC, as well as risk of domain hijacking, man-in-the-middle attacks and email spoofing for phishing.
Each day, our platform scores your vendors with a Cyber Security Rating out of 950. We'll alert you if their score drops.
UpGuard Breach Risk can help monitor for DMARC, combat typosquatting, prevent data breaches and data leaks, avoiding regulatory fines and protecting your customer's trust through cyber security ratings and continuous exposure detection.