5
LAZgroup SA - Business and Technology Solutions www.lazgroup.com [email protected] +41794822839 Rue du Cendrier 15, 1211 Geneva, Switzerland IT risks associated with outsource of Penetration Testing (Ethical Hacking) Written by Dr.Kretov Kirill from LAZgroup SA Introduction Presently, the idea that information governs the world is not anything new. The swifter and quicker business develops its technological and information framework, the higher is the risk of malicious access to the information. Commercial, financial, managerial, HR and other information is of interest not only for the company where it is created and used, but also for its competitors, and for people who can take hold of it for the purpose of further unauthorized usage and resale. The need for data security is always growing. Data security is a state of data protection when their integrity, availability and confidentiality are ensured. Information integrity means that the information does not change when it is stored or transmitted; availability means that authorized persons can use the information and access it at any time; confidentiality means unavailability of information for those who are not authorized for sufficient and lawful access to it. Information audit can be used to ensure data security. Generally, audit is performed to estimate the current level of data security, to assess possible risks during information storage and use in the company, and also to determine high-priority measures that will minimize the risks and information leakage threat. During audit, we reveal the security level provided in the automated system, and collected statistics helps determine further steps to reach complete information security in the company. Security audit types include penetration tests (or "pentests") aimed at determination of various vulnerability search methods and ways for intrusion into company' information systems from the outside, for example, via the Internet. Penetration tests are mainly performed to estimate the overall company level of protection from external threats and directed attacks, and also to document the actions and to create a report on them. In most cases, the testing procedure consists of three steps, and each of the steps includes a number of quite specific jobs. The first step covers operations planning and preparation. The second step includes penetration into the automated system itself, and the third step is report creation and, possibly, recommendations to improve data security. More often, a company admits penetration testing when it needs to evaluate possible damage from malicious activities, to estimate the security level of specific company information assets, to determine the most vulnerable places in the information security system or to assess the measures taken by the company staff members in case of penetration attempts. However, one must not think that the testing procedure guaranties complete security for the company. Sometimes this is not true, as long as any penetration attempt may cause unexpected and crucial results for the audited company. This article is intellectual property lazgroup.com. There are two major groups of risks we should always keep in mind.

Lazgroupcom_Itrisksassociatedwithpenetrationtesting

Embed Size (px)

DESCRIPTION

LAZgroup SA - Business and Technology Solutions www.lazgroup.com [email protected] +41794822839 Rue du Cendrier 15, 1211 Geneva, Switzerland IT risks associated with outsource of Penetration Testin g (Ethical Hacking) Written by Dr.Kretov Kirill from LAZgroup SA Introduction Presently, the idea that information governs the world is not anything new.

Citation preview

LAZgroup SA - Business and Technology Solutions

www.lazgroup.com [email protected] +41794822839

Rue du Cendrier 15, 1211 Geneva, Switzerland

IT risks associated with outsource of Penetration Testing

(Ethical Hacking)

Written by Dr.Kretov Kirill from LAZgroup SA

Introduction

Presently, the idea that information governs the world is not anything new. The swifter and

quicker business develops its technological and information framework, the higher is the risk

of malicious access to the information. Commercial, financial, managerial, HR and other

information is of interest not only for the company where it is created and used, but also for

its competitors, and for people who can take hold of it for the purpose of further unauthorized

usage and resale. The need for data security is always growing.

Data security is a state of data protection when their integrity, availability and confidentiality

are ensured. Information integrity means that the information does not change when it is

stored or transmitted; availability means that authorized persons can use the information and

access it at any time; confidentiality means unavailability of information for those who are not

authorized for sufficient and lawful access to it.

Information audit can be used to ensure data security. Generally, audit is performed to

estimate the current level of data security, to assess possible risks during information storage

and use in the company, and also to determine high-priority measures that will minimize the

risks and information leakage threat. During audit, we reveal the security level provided in the

automated system, and collected statistics helps determine further steps to reach complete

information security in the company.

Security audit types include penetration tests (or "pentests") aimed at determination of various

vulnerability search methods and ways for intrusion into company' information systems from

the outside, for example, via the Internet. Penetration tests are mainly performed to estimate

the overall company level of protection from external threats and directed attacks, and also to

document the actions and to create a report on them.

In most cases, the testing procedure consists of three steps, and each of the steps includes a

number of quite specific jobs. The first step covers operations planning and preparation. The

second step includes penetration into the automated system itself, and the third step is report

creation and, possibly, recommendations to improve data security.

More often, a company admits penetration testing when it needs to evaluate possible damage

from malicious activities, to estimate the security level of specific company information

assets, to determine the most vulnerable places in the information security system or to assess

the measures taken by the company staff members in case of penetration attempts.

However, one must not think that the testing procedure guaranties complete security for the

company. Sometimes this is not true, as long as any penetration attempt may cause

unexpected and crucial results for the audited company. This article is intellectual property

lazgroup.com. There are two major groups of risks we should always keep in mind.

LAZgroup SA - Business and Technology Solutions

www.lazgroup.com [email protected] +41794822839

Rue du Cendrier 15, 1211 Geneva, Switzerland

Risks due to the Testing Company

The first group of risks is caused directly by the company that performs the security audit in

the customer company. In other words, a company wishing to have reliable data security

checks whether the information is accessible from the outside by intentionally making it

accessible, because a lot of vulnerabilities are usually revealed during pentests and testers

access the protected data.

Is it actually so bad? If the customer wishes to have penetration tests performed, the Customer

signs a non-disclosure agreement with the testing company. Despite that the most of

companies think this is enough, each penetration test brings additional risks. We should keep

in mind that each auditor group consists of persons, and the human factor cannot be ignored.

First of all, it is the human factor that makes different penetration testing companies perform

pentests differently. Thus, vulnerabilities that can be revealed by one group will remain

unknown for another group, and vice versa. That is why, logically, you cannot completely

rely on the results of penetration tests to ensure information security. Real penetration threat

exists anyway, as long as different groups and different hackers can apply various methods to

the revealed vulnerabilities. In other words, such testing will not fully guarantee security in

the customer company.

Even when the testing is finished and vulnerabilities have been found in the customer

automated system, the testing company can simply save the obtained information on the

software, network structure, etc. or conceal some vulnerabilities from the customer. Also, the

tested company will now be open to all risks of the auditing company.

The point is that it is too hard to maintain security within the company. And the risk that

employees of the testing company – for example, after they're fired – will use the information

to their own benefit or to the benefit of competitors. This is not a rare situation, and the

statistics for such cases, unfortunately, do grow.

Often, client information leaks from companies that trust too much to their IT service

providers (the latter can be outsourcing companies, processing centers, security audit

companies). According to the American telecommunication company Verizon

Communications, more then a half of all known information leaks in restaurant and retail shop

networks and other organizations that, for whatever reasons, cannot afford high-grade IT staff,

are due to unfair partners from the outside or the companies offering information security

audit services.

Here is a specific example. In 2009, the owner of a large IT company in the USA engaged in

information audit and outsourcing services was accused of theft of confidential data of more

than 8 million people. All information was coming from large serviced companies, and the

investigation revealed that the created database was intended for sale to competitors. Details

of what data had been stolen, and the list of the aggrieved organizations were not published in

the interests of the investigation, but it was known for sure that during the audit, information

on the organizations network operation was carefully gathered for the purpose of further

illegal use and theft.

As illustrated by the examples, unfair companies among those who can render information

audit services are not a rare exception. And though data leakage due to own company

employees or insiders seems the most probable, it usually does not make sense to impose the

company to additional risks for the sake of false safety feeling.

LAZgroup SA - Business and Technology Solutions

www.lazgroup.com [email protected] +41794822839

Rue du Cendrier 15, 1211 Geneva, Switzerland

Even when you do need penetration testing from the outside, you must first carefully examine

reputation of the company to conduct the research. But the company's reputation is not

enough. Find out as much as possible about the company management and technicians.

Because even a perfect-reputation company that provides high-quality security audit services

might employ persons who secretly help competitors with the main intention of accessing the

protected information without testing interruption.

Part of information being used internally by the company has a long lifespan, meaning that if

such information becomes available to anyone else even after a few months, the company will

still suffer essential losses. Thus, one must be very careful when attracting external human

resources and pay attention not only to their skills, cost and quality, but also to potential

consequences of granting them access to the company information assets.

Another threat during penetration tests is the investigation of various attack scenarios.

Employees of the auditor company can document only some of the vulnerabilities revealed in

the information protection system, while the remaining vulnerabilities can still be used by

hackers.

Technical Risks

Even when penetration tests bring good results, eliminating lots of vulnerabilities, they still do

not guarantee that information will remain inaccessible in a few days, weeks, or months. The

point is that new vulnerabilities arise every day, new types of attack are used, and even some

old vulnerabilities can be utilized a-new with the course of time. No information security

organization can possess the complete information on all vulnerabilities. That is why

vulnerabilities that will be used tomorrow may strongly differ from the existing ones.

By providing fast operation in data networks and using the Internet in daily activities,

companies make their business more effective and flexible, on the one hand, but at the same

time, increase the risks, because absolutely secure systems do not exist. Failures of network

protocols and services, faults in network equipment operation may cause not only direct

financial losses to the company, but also loss of reputation, the latter being a more serious

harm for many large companies means as compared to financial losses. Information security

becomes more and more important, since more and more services allow maintaining customer

relations directly via the Internet.

Usually, vulnerability means that the malicious user can make the application perform

operations for which user has insufficient or no rights at all by issuing a corresponding

command. And though there are detection tools for different types of vulnerabilities, they can

never substitute a person's experience during information security research.

In the attempts of security provision, management of many companies often makes severe

errors that may result in further serious consequences for the company. Among them are:

The company's staff is excessively confident in reliability of the security technologies used.

Accurate technical information on the security level does not exist.

There is no clear information security policy.

IT department staff qualification is insufficient.

LAZgroup SA - Business and Technology Solutions

www.lazgroup.com [email protected] +41794822839

Rue du Cendrier 15, 1211 Geneva, Switzerland

This article is intellectual Property of Dr. Kretov Kirill, the founder of LAZgroup SA

The personnel wrongly think that there is no important information for hackers in the company's information system.

The personnel wrongly think that company's web site/server cracking will not result in serious losses.

Based on of last-year statistics gathered during analysis of almost 12 thousand of various

programs and web applications, more than 97 thousand vulnerabilities has been found. They

differ in their threat level, but more than a half of them are urgent and critical, the data from

13% of systems can be automatically compromised. In the course of detailed testing, the

probability of revealing critical vulnerabilities reaches extreme rates – from 80% to 96%.

Any company can suffer from cyber attacks regardless of its business. Of course, hackers are

mainly interested in large organizations, but small companies usually suffer more severe

damages from such illegal activities. Small companies, as well as mid-sized businesses, often

suffer from harmful software and viruses, which are becoming harder to neutralize. Note that

data security companies themselves are often the target for directed network attacks.

Interesting statistics has been published by Ponemon Institute. The research, in which the

information received from 45 large American companies had been used, showed how great

are the losses of a company from attacks using the vulnerabilities in the information system.

On the average, companies lose a little less than four million dollars per year due to such

faulty conditions, and this figure ranges from one million for medium-scale companies to 52

million dollars. Struggle against network data leakages, attacks of companies' web sites and

online services, and also harmful software distribution, constitutes the lion share of costs for

information security maintenance. But nevertheless, the studied companies had been exposed

to more than 50 successful attacks per week during which hackers could have plundered the

data.

As proved by the above impressive statistics, hackers do their criminal business with

impunity. While competition in this field grows, prices for computer network cracking and

information theft fall, but hackers' proficiency continues to increase. Among all hackers, no

more than ten persons are exposed to criminal liability a year, and for some frauds with a

mullions-strong turn the hackers are subject to conditional prison sentence. Experts think that

such avalanche-like growth of criminality in information technologies is a considerable threat

for any business.

Conclusion

In conclusion, we have to emphasize the fact that the situation in the field of information

protection is rapidly changing, and a company must response to each change as promptly as

possible. Any new vulnerability revealed, any weakness of an anti-penetration system may

result not only in direct financial losses, but also in irrevocable loss of partner reputation,

which is often much more important.

Hackers' arsenal grows with new complicated software and hardware, and their proficiency

has long ago advanced the proficiency of an average employee in an IT or information

security department. A company can protect itself from possible threats only by constantly

paying attention to network and other resources integrity and security. As for now,

LAZgroup SA - Business and Technology Solutions

www.lazgroup.com [email protected] +41794822839

Rue du Cendrier 15, 1211 Geneva, Switzerland

vulnerabilities have been found out in all operating systems. Once again, this is to prove that

no absolute security can be guaranteed, and will not be guaranteed in the nearest future.

But you can keep your risks at a minimum. For this purpose, prompt staff response in case of

threat detection is crucial, as well as timely installation and update of anti-virus software and

firewalls, installation of all critical and essential operating systems updates. Staff overall

awareness on the recent known vulnerabilities, viruses and harmful software is also important.

Many organizations resort to penetration tests as the last possible measure. But now, this

measure is expensive and ineffective. During such test, only part of existing vulnerabilities

will be discovered, meanwhile new methods for information security breaks appear almost

every day. One must understand that even a large company providing computer audit services

may be exposed to its own internal data leakage risks. Entrusting such company with detailed

information about network structure, operations and protocols basically means taking and

covering all risks of the company. So, penetration tests usually grant you false, illusory safety.

Internal network audit methods are more effective than penetration testing. A company must

use software for access restriction, user activity monitoring and data encryption, and also

network activity logs must be monitored on a regular basis. This is a necessary condition for

keeping the information loss risk at an acceptable minimum.

Written in January 2010 by Dr.Kretov Kirill specially for LAZgroup SA