{"id":165,"date":"2007-02-21T00:00:00","date_gmt":"2007-02-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/21\/avoid-wasting-money-on-penetration-testing\/"},"modified":"2021-12-30T11:36:38","modified_gmt":"2021-12-30T11:36:38","slug":"avoid-wasting-money-on-penetration-testing","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/21\/avoid-wasting-money-on-penetration-testing\/","title":{"rendered":"Avoid Wasting Money on Penetration Testing"},"content":{"rendered":"<p>Penetration Testing is the final word in proving that technical compliance and good security practices are in place &#8211; or so it should be.  What is the impact on quality if the consultant is overworked?  The trouble with asking questions like these is that there&#8217;s no tick box to check when choosing your supplier.  Is it good quality for the consultant to do a quick portscan, and not cover all 65k ports for example?  Doing a full port scan takes time, and usually turns up nothing, a quick portscan wouldn&#8217;t find.  Is it good quality, to identify &#8216;autocomplete&#8217; on an application as low risk, because that&#8217;s the standard classification, without taking in to account the context of the application and the business &#8211; e.g. a banking application?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is it reasonable to assume that an expert at testing Solaris, AIX, and other Unix flavours is also going to be equally as good on Windows?  The truth is that most consultants have favourite platforms which they know at a deep level, and are either just competent or even incompetent with other platforms.  Just as you wouldn&#8217;t use a tractor on a racetrack, or a Ferrari in a field, you wouldn&#8217;t put a Unix expert on a windows test, or an Oracle expert on a MSSQL assignment.<\/p>\n<p>Consultants hate report writing The secret is out &#8211; consultants hate writing reports.  You don&#8217;t &#8216;see&#8217; the assessment &#8211; you see the report!  The report IS the deliverable Remember, it is the Executive Summary that you will show to your manager, the remediation ad-vice that you will give to your team, and the classified vulnerabilities that your auditor will review.<\/p>\n<p>The Methodology No doubt you&#8217;ve read, or at least skimmed through the &#8220;Methodology&#8221; paper on your suppliers web site, or their glossy brochure.  It is designed to demonstrate a deep understanding of the assessment process.  A consultant can do an excellent job without following the company methodology, but by not having a structure to work with, there is a good chance the results will be inconsistent at best, and dangerously incomplete at worst.  It&#8217;s easy to wheel in a star consultant to win the business, but follow through with a trainee.<\/p>\n<p>Finally, remember that companies don&#8217;t perform penetration tests, people do.  So no matter which company you go to, it always boils down to the person you have working on your account.<\/p>\n<p>http:\/\/www.it-observer.com\/articles\/1308\/avoid_wasting_money_penetration_testing\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-165","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=165"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/165\/revisions"}],"predecessor-version":[{"id":2652,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/165\/revisions\/2652"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}