Вы находитесь на странице: 1из 4

Case Study: Penetration-Testing Tool Use

Gartner RAS Core Research Note G00155811, John Pescatore, 4 May 2008, R2742 05232009

Organizations with the technical capabilities to buy and use


penetration-testing tools can reduce risk and gain business
benefits. Penetration-testing services can be used by organizations
that do not have the expertise or personnel available.
Key Findings
• Penetration testing provides a level of risk assessment above vulnerability scanning, but it
requires investment in technical expertise and regular use to provide security benefits.
• Penetration tests should be formally scheduled and augmented with ad hoc testing, driven
by changes in the IT, business or threat environments.
• There is the risk of affecting business systems during penetration testing, but this risk can
be minimized by thorough preparation and planning.
• Open-source, penetration-testing tools are available for organizations that do not have the
budget to buy commercial products; however, the open-source products will require
significantly higher levels of staffing.

Recommendations

• Penetration testing should be part of a vulnerability management program for all


enterprises that may be targeted by financially motivated attacks.
• Enterprises that already buy and use vulnerability assessment products with well-defined
vulnerability assessment processes are candidates for augmenting those processes with
penetration-testing tools.
• Enterprises that outsource vulnerability assessments should look to penetration-testing
services, not products.
2
WHAT YOU NEED TO KNOW complex and targeted, and believed that “hacker in a box” testing

The growth in financially motivated, targeted threats has driven the approaches were needed. He had experience with open-source,

need to augment standard vulnerability assessment efforts with penetration-testing tools such as The Metasploit Project,

penetration testing. For many organizations, using external Immunity’s Canvas and early versions of Saint’s Exploit, and

consultancies to conduct periodic penetration tests will be the believed acquiring penetration-testing tools would provide the

most appropriate approach. Organizations with sufficient technical security baseline visibility and a more targeted presentation of what

capabilities and mature vulnerability assessment programs, and the most-critical vulnerabilities were.

those that use commercial or open-source, penetration-testing


tools, can provide higher levels of security and quicker reactions to The security architect felt that buying a commercially supported

changing threat environments. product would be the best way to go, rather than using open-
source tools, because of the need for management, reporting and
CASE STUDY support capabilities. He surveyed the security market and came
Introduction
across the Core Impact product from Core Security Technologies.
Company A is a global manufacturer in the power/energy and He evaluated the product’s capability, did not see any other
transportation fields. It has an annual turnover of approximately commercial products at the time with equivalent capabilities and, in
$20 billion, with 70,000 employees in 70 countries. The transport 2006, acquired the Core Impact penetration-testing product.
business unit hired its first full-time information security person (its Although the security architect did not do a competitive evaluation,
IT security director) in 2005. In late 2007, this position evolved into other commercial products are available (see Note 1).
the security architect position, responsible for security strategies
for the entire company. Results
Once the procurement was processed, it took a few days to obtain
The Challenge
and install the software, and take a half-day training class from
When the new security architect came on board in 2005, he knew Core Security. The security architect is the primary user of Core
he needed a way to quickly baseline the actual security status of Impact and initially ran penetration tests on a near-daily basis to
the organization’s IT systems and networks. He considered become familiar with the tool and to create the initial security
bringing in an outside consultancy to perform a security audit and baseline. He has now settled into running the tool quarterly to
penetration test, but that would cost around $50,000 for a one- support regular reporting, plus additional runs after any major
time analysis. The security architect felt he needed to create a change on the network or upon special request. The typical
process that would remain in use during the long term, and penetration-testing run is done against 40,000 nodes on Company
procure tools to implement that process. Corporate management A’s network. The results are provided to the IT compliance officer
supported him and approved funding. for compliance reporting, and to the IT operations group for
patching and other configuration mitigation efforts.
Approach
The transport group had been using vulnerability assessment
The security architect warns the operations staff when penetration
scanning tools, but the security architect felt those tools resulted in
tests will be launched to avoid any appearance of an actual
“information overload,” with long lists of vulnerabilities but no
incident that might cause business disruption if incident response
prioritization by the likelihood that a vulnerability could actually be
accessed and used to cause damage to mission-critical systems.
He also knew that threats on the Internet were getting more

© 2008 Gartner, Inc. and/or its Affiliates. All Rights Reserved. Reproduction and distribution of this publication in any form without prior written permission is
forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy,
completeness or adequacy of such information. Although Gartner’s research may discuss legal issues related to the information technology business, Gartner
does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or
inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
3
actions were initiated. During the course of using the Core Impact
Note 1
Penetration-Testing Tools product for a year, the security architect has only had one server
experience a production disruption caused by penetration testing –
The major commercial penetration-testing products available
today include: a server on a high-speed network that was sensitive to workload
• Core Security Core Impact (www.coresecurity.com) disruption. The security architect was able to easily tune the tests
• Immunity Canvas (www.immunitysec.com) to avoid any future disruptions.
• Saint Exploit (www.saintcorporation.com)
Although production disruption, in this case, was minor, it serves
Rapid7’s NeXpose (www.rapid7.com) has many of the
as an example of the need for testing and phased production
features of a penetration-testing tool, but it is more of a
broad vulnerability-scanning product. deployment. The security architect believes the detailed effects of
information provided by penetration-testing tools is helpful in
The major open-source, penetration-testing tools include:
convincing IT and corporate management when mitigation actions
• BackTrack (www.remote-exploit.org)
need to be prioritized.
• The Metasploit Project (www.metasploit.org)

The SecurityForest Exploitation Framework


(www.securityforest.com) also has penetration-testing
capabilities, but does not seem to be actively supported.
4

Critical Success Factors Lessons Learned

• The security architect’s experience with penetration-testing • Being able to explain the impact of vulnerabilities to the
tools enabled him to rapidly initiate a penetration-testing business makes it easier to gain support for necessary
program and minimize how much time it takes each quarter to changes.
run the tests and interpret the results. • The risk of trying to do surprise penetration tests outweighs the
• Information provided by penetration-testing tools makes it benefits.
easier to convince management when immediate or costly • By using a controlled, repeatable process, penetration testing
security actions need to be taken. can provide increased value.
• Minimizing disruption to production systems requires some
ongoing effort, but it pays off.

Вам также может понравиться