Penetration Testing Services Procurement Guide
By CREST
()
About this ebook
Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, explaining what a penetration test is (and is not), outlining its strengths and limitations, and describing why an organisation would typically choose to employ an external provider of penetration testing services.
CREST
CREST is a not for profit organisation that serves the needs of a technical information security marketplace that requires the services of a regulated professional services industry. CREST provides organisations wishing to buy penetration testing services with confidence that the work will be carried out by qualified individuals with up to date knowledge, skill and competence of the latest vulnerabilities and techniques used by real attackers. All examinations used to assess individuals have been reviewed and approved by GCHQ, CESG. They will also know that the penetration testers are supported by a company with appropriate policies processes and procedures for conducting this type of work and for the protection of client information.
Related to Penetration Testing Services Procurement Guide
Related ebooks
Effective Vulnerability Management: Managing Risk in the Vulnerable Digital Ecosystem Rating: 5 out of 5 stars5/5Web Application Security is a Stack: How to CYA (Cover Your Apps) Completely Rating: 0 out of 5 stars0 ratingsInformation Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsEnterprise Security: A Data-Centric Approach to Securing the Enterprise Rating: 0 out of 5 stars0 ratingsPenetration Testing Fundamentals -1: Penetration Testing Study Guide To Breaking Into Systems Rating: 0 out of 5 stars0 ratingsPenetration Testing with Kali Linux: Learn Hands-on Penetration Testing Using a Process-Driven Framework (English Edition) Rating: 0 out of 5 stars0 ratingsSecurity Architect: Careers in information security Rating: 4 out of 5 stars4/5Security Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Advanced Cybersecurity Strategies: Navigating Threats and Safeguarding Data Rating: 0 out of 5 stars0 ratingsCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Rating: 0 out of 5 stars0 ratingsCyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions Rating: 0 out of 5 stars0 ratingsLessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure Rating: 0 out of 5 stars0 ratingsNIST Cybersecurity Framework: A pocket guide Rating: 5 out of 5 stars5/5Procuring Penetration Testing Services Rating: 0 out of 5 stars0 ratingsAZURE AZ 500 STUDY GUIDE-1: Microsoft Certified Associate Azure Security Engineer: Exam-AZ 500 Rating: 0 out of 5 stars0 ratingsPenetration Testing: Protecting networks and systems Rating: 0 out of 5 stars0 ratingsCybersecurity Blue Team Toolkit Rating: 2 out of 5 stars2/5How to Implement Artificial Intelligence and Cybersecurity in Modern Businesses Rating: 0 out of 5 stars0 ratingsWeb Penetration Testing with Kali Linux Rating: 5 out of 5 stars5/5Cyber Security Consultants Playbook Rating: 0 out of 5 stars0 ratingsCybersecurity: Issues of Today, a Path for Tomorrow Rating: 0 out of 5 stars0 ratingsFundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors Rating: 5 out of 5 stars5/5CompTIA PenTest+ Study Guide: Exam PT0-001 Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: How Directors and Corporate Officers Can Protect their Businesses Rating: 5 out of 5 stars5/5Information Security for Small and Midsized Businesses Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratings
Security For You
Deep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsLinux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Learning Android Forensics Rating: 4 out of 5 stars4/5Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5CompTIA Data+ (Plus) The Ultimate Exam Prep Study Guide to Pass the Exam Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Metasploit Bootcamp Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Ethical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5
Reviews for Penetration Testing Services Procurement Guide
0 ratings0 reviews
Book preview
Penetration Testing Services Procurement Guide - CREST
A STRUCTURED APPROACH FOR PROCURING PENETRATION TESTING SERVICES
Stage A – Determine the business requirements for testing
Overview
Evaluate the drivers for conducting a penetration test
Identify target environment
Define the purpose of the penetration test
Produce requirements specification
Stage B – Agree testing scope
Overview
Determine testing style (eg. black, grey or white box testing)
Agree testing type (eg. web application or infrastructure testing)
Identify testing constraints
Produce scope statement
Stage C – Establish a management assurance framework
The need for a management assurance framework
Establish an assurance process
Define and agree contracts
Understand and mitigate risks
Introduce change management
Agree a problem resolution approach
Stage D – Plan and conduct testing
Overview
Carry out planning
Conduct research
Identify vulnerabilities
Exploit weaknesses
Report findings
Remediate issues
Stage E – Implement improvement programme
Overview
Address root causes of weaknesses
Evaluate penetration testing effectiveness
Identify lessons learned
Apply good practice enterprise-wide
Create and monitor an action plan
Agree approach for future testing
PART I: INTRODUCTION AND OVERVIEW
About this Guide
This Procurement Guide (the Guide) provides practical advice on the purchase and management of penetration testing services, helping you to conduct effective, value-for-money penetration testing. It is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.
The Guide presents a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, explaining what a penetration test is (and is not), outlining its’ strengths and limitations, and describing why an organisation would typically choose to employ an external provider of penetration testing services.
Presented as a useful five stage procurement approach, the Guide then provides advice and guidance on how to:
Determine business requirements for a penetration test, considering the drivers for testing, the purpose of testing and target environments.
Agree the testing scope, approving testing style and type and assessing testing constraints.
Establish a management framework to assure quality, reduce risk, manage changes and problems and agree contract.
Plan and conduct the penetration test itself, which consists of conducting research, identifying vulnerabilities, exploiting weaknesses, report finding and remediating issues.
Implement an improvement programme to address weaknesses, identify lessons learned, instigate actions and agree an approach for future testing.
Finally, the Guide highlights the main criteria to consider when choosing an appropriate external provider of penetration testing services (referred to as ‘the supplier’). The six key selection criteria for choosing a suitable supplier of penetration testing services are highlighted in Figure 1 and explored in more detail in Part 4 – Choosing a suitable supplier.
Figure 1: Key selection criteria for choosing a suitable supplier of penetration testing services
Purpose
The purpose of the Procurement Guide is to help you to:
Understand objectives for conducting a penetration test;
Gain an overview of the key components of an effective penetration testing approach;
Determine whether or not to conduct a penetration test;
Assess the need to outsource the undertaking of a penetration test;
Identify what needs to be considered when planning for a penetration test;
Consider the different types of penetration tests that are available;
Learn about the penetration testing process – and associated methodologies;
Determine criteria upon which to base selection of an appropriate supplier.
Scope
This Guide is focused on helping your organisation to choose the right supplier, at the right time, for the right reasons. This Guide is designed to help organisations procure penetration services from external suppliers, but will also be useful for organisations conducting penetration tests themselves.
Rationale
Organisations have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing; the probability of a security weakness being accidentally exposed or maliciously exploited needs to be continually assessed – such as via a penetration test – to ensure that the level of risk is at an acceptable level to the business.
Much of the material in this Guide is based on the findings of a research project – conducted by Jerakano Limited on behalf of CREST – about the main requirements organisations have for considering and conducting penetration tests. One of the main reasons for commissioning a research project was that the customers of CREST members were often unclear about how to best procure penetration testing services.