Skip to the main content.
Government Programs
Integrated technology, solutions, and services that support rapid innovation within the DoD ecosystem.

CMMC Preparation & Assessment
Cybersecurity Assurance Readiness (CSAR®/RMF Pro)
ATO/RMF Support

Book GP Demo

Professional Services
Expertise in security strategy, incident response readiness, policy development, and risk assessments.

Risk Assessments
vCISO
Penetration Testing

Book ProServ Demo

Digital Forensics & Incident Response
Are You Under Attack?

If you are concerned about a potential threat or are experiencing a breach, contact our 24/7/365 emergency hotline at 888-860-0452.

CONTACT US

Subscribe-to-NetSec-News-v4Subscribe to NetSec News

Sign up to receive our biweekly newsletter that covers what's happening in cybersecurity including news, trends, and thought leadership.

SIGN UP

Ingalls Information Security

At our core, Ingalls is a company that strives to be helpful to our clients while continuously innovating and evolving our technology and solutions. Since 2010, we have been dedicated to building a team and product that can stay steps ahead of threats, attacks, and vulnerabilities in an ever-changing landscape.

Meet The Leadership Team

7 min read

What is a Pen Test: A Critical Piece to Your Business Security Strategy

Today’s cybersecurity swings like a pendulum between the latest announced threats and latest security solutions. The majority of cyber activities operate in between the pendulum swings, and within that time new vulnerabilities are discovered and exploited like never before. 

This leaves businesses and organizations in a constant need for adaptive and professional protective services. Not only to keep up with emerging threats but also to make sure nothing is left vulnerable or out of regulatory requirement in the process of setting up, transitioning, merging, or maintaining new and legacy systems. 

Vulnerability scans are a great tool toward this goal, but they are not and should not be the sole solution, due in part to their static nature. Realistically, a proactive approach to threat hunting and threat mitigation that incorporates the mindset of what an attacker is willing and potentially capable of doing is required. 

So, have you considered a pen test? This blog post will cover the benefits of penetration testing and why it’s a critical piece of your security strategy.


What Is a Pen Test?

Pen testing — or penetration testing — is a controlled evaluation of a network, application, or system’s security through the lens of a threat actor conducting an actual cyber attack and performed by ethical hackers. They can be conducted independently using in-house or third-party testing agents. Pen tests identify exploitable weaknesses and misconfigurations that would allow the initial access, foothold, lateral movement and or other capabilities or resources needed to complete an attacker's objective. As a legitimate security activity, a pen test provides a “reliable way of identifying the risk of vulnerabilities in aggregate” (NIST SP 800-115), as a real world breach is rarely limited to just one method of exploitation. 

Vulnerabilities can be endemic to the systems, services, or individual components in use by an organization. They may occur in communication channels, authentication and authorization failures, implementation errors, configuration faults, and other physical or operational deficiencies.

With the possible complexity of any given organization’s environment, NIST (NIST SP 800-53Ar5) proposes that the usefulness of penetration testing “can be viewed not as a means to verify security and privacy features, but rather as a means to enhance the organization’s understanding of the system, uncover weaknesses or deficiencies in the system, and indicate the level of effort required on the part of adversaries to breach the system’s safeguards.”

When defining what a pen test is, it becomes important to note that any given engagement can vary depending on the needs of the business or organization. This is why it is critical to clearly define a scope where factors like the Rules of Engagement (ROE) are recorded and approved by all involved parties. Multiple considerations will be addressed when defining the scope, which will essentially determine the initial level of access to or knowledge of the environment to be assessed (the methodology), the timeline to conduct the test, the type of threat source to simulate, and any limitations to be imposed. To state simply: the goal of the scope is to determine the breadth, depth, and constraints of the pen test. 

There are three commonly accepted test methodologies:

  • Black-box: where the system, object, or network is completely unknown, or assumed unknown for the purposes of the test. 
  • Gray-box: where some access or knowledge of the client’s network, targeted object, or system has been provided.
  • White-box: where explicit, complete knowledge and or access to the targeted network, object, or system has been provided.  

Determining the appropriate methodology will be critical to meeting the established testing requirements. For example, if the engagement is confined to a short span of time, or focused on a specific system, it is worth consideration to allow an “assumed breach” approach (Gray-box or White-box) as to not waste valuable time against initial and basic security controls (such as a firewall).  

These methodologies can apply to all types of engagements from those focused on cloud architectures to local systems, limited applications and physical security control testing.


Why Is a Pen Test Important to Your Business Security Strategy?

Penetration tests can provide a greater level of analysis than would ordinarily be possible for demonstrating the effectiveness of current security controls (and thus affect an organization’s overall security posture), especially when revealing the absence of them. Security Controls that are overlooked or ignored often provide the perfect avenue for a threat actor to gain access to sensitive systems, and so it is strongly recommended the organization or business start with ensuring these are addressed. The latest CIS Controls v8, along with CIS Benchmarks, provide a roadmap of recommended and prioritized actions for scalable cyber defense (up to and including a pen test as it happens) and act as companions to additional frameworks such as PCI DSS, NIST, FISMA, HIPAA, GDPR, and ISO/IEC 27001.

CIS ControlsSource: cisecurity.org

Implementing these will go a long way toward solidifying a basic business cybersecurity strategy, as well as align the organization or business with industry and government security requirements. 

As CIS states in Controls v8, “ A successful defensive posture requires a comprehensive program of effective policies and governance, strong technical defenses, combined with appropriate action from people. However, it is rarely perfect. In a complex environment where technology is constantly evolving and new attacker tradecraft appears regularly, enterprises should periodically test their controls to identify gaps and to assess their resiliency. “

Therefore, after establishing that other controls are met, initiating a pen test will reveal security flaws in the way that a real world threat actor would see them, before they are exploited. Whereas a Tabletop Exercise (TTX) as part of Incident Response Management will test the business or organization’s response to an incident, a pen test can reveal deeply rooted technical issues that risk exposing sensitive data to any variety of misuse, corruption, or outright destruction. Ingalls’ Senior Cybersecurity Consultant Scotlyn Clark states, “The purpose of penetration testing is to understand not only whether or not vulnerabilities exist, but if and how they can be exploited. And, if they can be exploited, what’s the consequence?”


3 Benefits of a Pen Test

  • It’s one of the best ways to gather data on what systems currently lack proper management
  • A pen test helps you start the planning and execution of countermeasures that will provide a more robust and resilient security posture
  • As a critical initial step in improving security, a pen test can improve the overall protection of the business or organization by improving privacy awareness, responsibility, and continued training, especially where social engineering comes into play


What to Expect During a Pen Test

Once the pen test is underway, the assessment team will essentially work through 4 phases as laid out in NIST 800-115:

  • Planning
  • Discovery 
  • Attack
  • Reporting 

Four-Stage Penetration Testing Methodology

Four-Stage Penetration Testing MethodologySource: NIST 800-115

 

Although the actions performed during testing can vary, this chart provides a generally accepted grouping of what to expect. In a well executed pen test, reporting will exist concurrently with the other phases in order to facilitate critical needs or address concerns that may arise while the engagement is in progress.   


Planning

During planning,  the groundwork is laid out to determine the communications, the scope, the timeline, the parties that will need to be involved, and any other requirements in order to have a successful pen test. It is recommended that select personnel who are responsible for information security and system/network administrators be in attendance at a minimum. 


Discovery 

This is the actual beginning of the pen testing activity and typically involves the enumeration of systems and potential resources the pen testing team will look to exploit/utilize further later on. These can be anything from open ports to physical inspections of a facility (in cases where physical pen tests are within scope). Vulnerability scans (such as a Nessus scan) will often be utilized during this phase, but this is only a fraction of the actual work to be done, potential vulnerabilities found during this time will need to be confirmed in the attack phase. 


Attack

Once the information is gathered and vulnerabilities in targeted systems are mapped, the attack phase begins. Previously identified potential vulnerabilities will be put through the wringer in attempted exploitation. Anything from weak passwords, active directory misconfigurations, and API mishandling can give rise to additional access. If successful, they are recorded in documentation and recommendations are made to their mitigation. During this time, each successful exploit may lead to additional vulnerabilities as attackers progress through the scope of testing. These will each be analyzed to determine the level of risk to the client and any critical security holes, including those that may cause significant impact outside the scope, should be immediately reported to the client. 

Systems that are being tested which are also monitored may witness occasional security alerts, but the goal in a pen test is to operate as quietly as possible, which simulates real-world tactics.


Reporting

As stated earlier, reporting will occur throughout the engagement. During planning, the desired level of communication, personnel to report to, and means of communication should be determined. For subsequent phases, logs and periodic reports are then dispersed according to that initial plan. At the conclusion of the pen test a final report is assembled and reviewed during the post-test debrief. 


Post-Pen Test Activities

After the team has completed their assessment, a final report will be prepared and delivered to the client for review. These can take on many forms but in general will contain the following:

  • Executive Summary - a brief overview of critical findings surrounding the pen test
  • Vulnerability Details - those successfully exploited and recommended solutions
  • Tests Performed - and whether they were successful
  • Artifact List - any known remaining artifacts from the test remaining on the system at the conclusion of the engagement 

It is important to make time after the pen test in order to address and remediate vulnerabilities with a structured approach. Determine a course of action for any finding or vulnerability discovered, identify and document what will be done as a task, assign responsibility for the task, and set the deadline to have it completed. This approach will ensure every issue is handled and that accountability is clearly defined.  


Addressing Concerns

There are, of course, many concerns which may arise with paying for anything designed to defeat security. There are three that tend to come up which provide the most agony:

  1. Will this disrupt the business or daily operations of the organization?
  2. How is sensitive information/data handled?
  3. How long is this going to take?


Disruption to Business

There is no guarantee that pen testing activities will avoid disrupting operations. However, a highly skilled and reputable team will possess the required skills to minimize disruptive actions. For example with Ingalls, Scotlyn notes that testing is tailored to our client’s needs, where active testing is scheduled  “around times that are less likely to affect employees or operations” and tactics considered too volatile are avoided. 

It is a priority second only to protecting clients’ data, to not impact operations.


Handling of Sensitive Data

When determining who will be conducting pen testing services, a highly important consideration should be made as to the standards they hold when handling sensitive data. You should expect all parties to sign an NDA and that the pen testing provider disclose their data destruction/classification policy with regards to the engagement during initial discussion. 


But really…how long will this take?

The duration of a pen test depends on factors surrounding the complexity of the target and the objective of the assessment. In general for an average size business or organization, it will likely take one to two weeks. However (especially for comprehensive black-box testing) they can proceed for greater lengths of time. This is due in part to the need of the assessors to build an effective attack path which may include specific tools and tactics such as a phishing campaign. Additionally, engagements with a broader scope or targeted applications with particular complexity can also prolong the overall time it takes to thoroughly complete a pen test.    


Next Steps

“Organizations must exercise due diligence in managing information security and privacy risk. This is accomplished, in part, by establishing a comprehensive risk management program“ (NIST SP 800-53

Many businesses and organizations are now required to enlist third-party pen testing services. Therefore we recommend planning ahead for scheduled testing, as clients may be competing for calendar space to complete them per regulatory deadlines. Also consider that it will take time and resources to both support the testing as well as resolve any critical issues that may be discovered during the engagement, or address any vulnerability findings after reporting. 

Ready to move into an improved business security strategy and build a stronger cyber defensive posture?  Learn more about our penetration testing and other professional services by reaching out to the experts at  Ingalls Professional Consulting Services via our contact form for more information today. 

Critical Advisory Notice for SquirrelWaffle and Qakbot

1 min read

Critical Advisory Notice for SquirrelWaffle and Qakbot

In September 2021, multiple security research teams observed and reported email reply-chain attacks that distributed new SquirrelWaffle Loader and...

Read More
Evolution of NIST 800–171, CMMC and Cybersecurity DFARS Clauses

Evolution of NIST 800–171, CMMC and Cybersecurity DFARS Clauses

The landscape of cybersecurity regulations in the United States has undergone a significant transformation over the years, reflecting the...

Read More
The Phishing Adventures of Huck Phinn, Plenty of Phish in the Sea

The Phishing Adventures of Huck Phinn, Plenty of Phish in the Sea

Chapter 1 Chances are you know about the dangers of clicking on fake emails so you carefully scroll through your inbox to delete them. You are...

Read More