We Need More Than Penetration Testing
Last week I read an article titled People too trusting when it comes to their cybersecurity, experts say by Roy Wenzl of The Wichita Eagle. The following caught my eye and prompted this post:
[Connor] Brewer is a 19-year-old sophomore at Butler Community College, a self-described loner and tech geek...
Today he’s what technologists call a white-hat hacker, hacking legally for companies that pay to find their own security holes.
When Bill Young, Butler’s chief information security officer, went looking for a white-hat hacker, he hired Brewer, though Brewer has yet to complete his associate’s degree at Butler...
Butler’s security system comes under attack several times a week, Young said...
Brewer and others like him are hired by companies to deliberately attack a company’s security network. These companies pay bounties if the white hackers find security holes. “Pen testing,” they call it, for “penetration testing.”
Young has repeatedly assigned Brewer to hack into Butler’s computer system. “He finds security problems,” Young said. “And I patch them.”
On the face of it, this sounds like a win-win story. A young white hat hacker does something he enjoys, and his community college benefits from his expertise to defend itself.
My concern with this article is the final sentence:
Young has repeatedly assigned Brewer to hack into Butler’s computer system. “He finds security problems,” Young said. “And I patch them.”
This article does not mention whether Butler's CISO spends any time looking for intruders who have already compromised his organization. Finding security problems and patching them is only one step in the security process.
I still believe that the two best words ever uttered by Bruce Schneier were "monitor first," and I worry that organizations like those in this article are patching holes while intruders maneuver around them within the compromised network.
Tweet
[Connor] Brewer is a 19-year-old sophomore at Butler Community College, a self-described loner and tech geek...
Today he’s what technologists call a white-hat hacker, hacking legally for companies that pay to find their own security holes.
When Bill Young, Butler’s chief information security officer, went looking for a white-hat hacker, he hired Brewer, though Brewer has yet to complete his associate’s degree at Butler...
Butler’s security system comes under attack several times a week, Young said...
Brewer and others like him are hired by companies to deliberately attack a company’s security network. These companies pay bounties if the white hackers find security holes. “Pen testing,” they call it, for “penetration testing.”
Young has repeatedly assigned Brewer to hack into Butler’s computer system. “He finds security problems,” Young said. “And I patch them.”
My concern with this article is the final sentence:
Young has repeatedly assigned Brewer to hack into Butler’s computer system. “He finds security problems,” Young said. “And I patch them.”
This article does not mention whether Butler's CISO spends any time looking for intruders who have already compromised his organization. Finding security problems and patching them is only one step in the security process.
I still believe that the two best words ever uttered by Bruce Schneier were "monitor first," and I worry that organizations like those in this article are patching holes while intruders maneuver around them within the compromised network.
Tweet
Comments
A sort of 'post exploitation time to detect'. Am I dreaming ?
I'm inclined to say the individual findings/fixes identified by a penetration test are a side product and that a mature organization really uses the results to identify failings in processes which allows them to prevent and detect or deny such things in the future.
By not doing the aforementioned they are only extracting a small portion of the useful information provided by the service they procured. Despite and maybe because of feeling good at hitting some moles, they end up leaving themselves open to getting nailed at a later date by ignoring the rump of information they have in front of them.
If he's not already detecting and responding to intruders, then he's missing out on all of the free pentests.