Penetration testing is something that more companies and organizations should be considering as a necessary expense. I say this because, over the years, the cost of data breaches and other forms of malicious intrusions and disruptions are getting costlier. Per IBM Security’s “Cost of a Data Breach Report 2024,” the average cost of a breach has increased 10% year over year, with the healthcare sector having the highest cost breaches for 14 consecutive years. One of the most important statistics that stands out from the report is the average number of days to identify and contain a data breach involving credentials was 287 days or 42 weeks.
To put that into perspective, if it is January 1st, 2024, and your organization’s systems are compromised, it would not be until October 14th, 2024, that the breach is contained. Of course, the characteristics of these breaches varied depending on the attack vector, sector, and whether security compliance systems were in place.
Key Takeaways for Control 18
Penetration testing is an important aspect of discovery and identifying potential critical vulnerabilities within your organizations external network, internal network, applications, or systems. They provide a valuable insight into how your enterprise and human assets perform.
Penetration testing and vulnerability testing are commonly used interchangeably, and this is incorrect. Vulnerability testing is checking for the presence of known vulnerabilities, incorrectly configured assets and so on. Vulnerability testing is virtually completely automated with minimal user validation. Penetration testing exploits those weaknesses and tests which business processes or data may be impacted.
Safeguards for Control 18
18.1) Establish and Maintain a Penetration Testing Program.
Description: Establish and maintain a penetration testing program appropriate to the size, complexity, and maturity of the enterprise. Penetration testing program characteristics include scope, such as network, web application, Application Programming Interface (API), hosted services, and physical premise controls; frequency; limitations, such as acceptable hours and excluded attack types; point of contact information; remediation, such as how findings will be routed internally; and retrospective requirements.
Notes: The security function associated with this safeguard is Govern. An important reason organizations create or seek third-party penetration testing is to identify ways of intrusion into their systems from different attack vectors. With a clearly defined scope, a red team should be able to identify vulnerabilities in applications and systems, discover any weaknesses in development processes, and test your organization’s critical response capabilities.
18.2) Perform Periodic External Penetration Tests.
Description: Perform periodic external penetration tests based on program requirements, no less than annually. External penetration testing must include enterprise and environmental reconnaissance to detect exploitable information. Penetration testing requires specialized skills and experience and must be conducted through a qualified party. The testing may be a clear box or an opaque box.
Notes: The security function associated with this safeguard is Detect. When inquiring about external penetration tests from qualified parties, it’s good to do some research into their portfolio of customers and their pen-testing experience and expertise, depending on your type of organization. Another thing to keep in mind is what type of security models they offer, such as white box, grey box, or black box testing.
18.3) Remediate Penetration Test Findings.
Description: Remediate penetration test findings based on the enterprise’s policy for remediation scope and prioritization.
Notes: The security function associated with this safeguard is Protect. After your organization has remediated the critical findings by the pen-testing team, you can then begin remediation of the remaining issues as they fall within your organization’s remediation scope and prioritization.
18.4) Validate Security Measures.
Description: Validate security measures after each penetration test. If deemed necessary, modify rulesets and capabilities to detect the techniques used during testing.
Notes: The security function associated with this safeguard is Protect. Once testing is concluded, you can then take the write-up and make any necessary changes revealed during testing.
18.5) Perform Periodic Internal Penetration Tests.
Description: Perform periodic internal penetration tests based on program requirements, no less than annually. The testing may be a clear box or an opaque box.
Notes: The security function associated with this safeguard is Detect. It is recommended to have annual penetration testing using either white, grey, or black boxes.
Read more about the 18 CIS Controls here:
CIS Control 1: Inventory and Control of Enterprise Assets
CIS Control 2: Inventory and Control of Software Assets
CIS Control 3: Data Protection
CIS Control 4: Secure Configuration of Enterprise Assets and Software
CIS Control 5: Account Management
CIS Control 6: Access Control Management
CIS Control 7: Continuous Vulnerability Management
CIS Control 8: Audit Log Management
CIS Control 9: Email and Web Browser Protections
CIS Control 10: Malware Defenses
CIS Control 12: Network Infrastructure Management
CIS Control 13: Network Monitoring and Defense
CIS Control 14: Security Awareness and Skill Training
CIS Control 15: Service Provider Management
CIS Control 16: Application Software Security
CIS Control 17: Incident Response Management
CIS Control 18: Penetration Testing
Get Foundational Security with the CIS Controls Monitoring
Use CIS Controls to establish solid protection against the most common attacks. Use Tripwire to provide coverage for the controls.