Do It Yourself or Outsource? - Part 7 of a 7-part series - (Part 1 Here) (Part 2 Here) (Part 3 Here) (Part 4 Here) (Part 5 Here) (Part 6 Here)
It is my hope that this series of articles have successfully made the case for performing regularly scheduled penetration tests.
When combined with enforceable policies and procedures such tests can be an invaluable asset to any organization.
The question of "enforceable" is usually illustrated by an organizations password policy. The security officer might write a policy indicating a minimum password length of 8 characters.
However, the employees might complain that the password is too long and hard to remember. Ultimately the password policy is changed to something smaller, say 5 characters.
This effectively reduces the overall security and privacy benefits of having strong password policies.
One caution regarding penetration testing is to remember that penetration testing is not a magic bullet. It will not detect all problems in your networks and applications, especially when it involves custom code.
By searching for and finding the LHF in your organization, you are taking a major step in securing the information that gives value to your company.
From a privacy perspective, removing the LHF is one component of ensuring that sensitive data is not available by unauthorized users.
Increasing the overall security posture by eliminating LHF will provide management with confidence that their privacy concerns are being addressed and will help reinforce the notion that security and privacy are inextricably intertwined.
Regardless of how and when penetration testing is performed, none of the tests will be beneficial if the proper remediation steps are not completed.
Remember the goal is not just to fix what is broken but rather to incorporate the findings into long-term policies and procedures that will help to ensure that the issues found will not be recreated at some point in the future.
Business owners do not want to pay for annual tests and continue to find the same issues year after year. Take the results of the tests and use them to refine your IT practices so that each year the list of vulnerabilities continues to decrease.
You may never see that list reduced to zero but the real business value comes from the pursuit.
References
[1] http://en.wikipedia.org/wiki/Penetration testing
[2] Kevin Beaver, "Outsourcing security testing: What's right for you?", October 2004.http://searchcio-midmarket.techtarget.com/news/column/0,294698,sid183_gci1018599,00.html#
[3] http://en.wikipedia.org/wiki/Tiger_team
[4] PCI DSS Standards - https://www.pcisecuritystandards.org/
[5] Roger Irvin, "What is FUD?", 1998. http://www.cavcomp.demon.co.uk/halloween/fuddef.html
[6] Stuart McClure, Joel Scambray, George Kurtz, "Hacking Exposed: Fifth Edition", McGraw Hill, 2005.
[7] ISECOM: http://www.isecom.org/
[8] SANS: www.sans.org
[9] Foundstone: http://www.foundstone.com/us/education-overview.asp
[10] http://dev.mysql.com/doc/refman/5.0/en/default-privileges.html
[11] http://support.microsoft.com/kb/313418
[12] http://download.oracle.com/docs/cd/B10501_01/win.920/a95490/username.htm
[13] http://www.securiteam.com/securityreviews/5DP0N1P76E.html
BRYAN MILLER has over 25 years of Information Technology experience. His education includes a B.S. in Information Systems and a M.S. in Computer Science from Virginia Commonwealth University (VCU) in Richmond, VA. Industry certifications include the Cisco CCIE in Routing/Switching and the ISC CISSP. In August of 2007, Bryan founded Syrinx Technologies. Email: bryan@syrinxtech.com