Class Read 41: Reconnaissance - taylortommy23/401-Reading-Notes GitHub Wiki
How are the stages of a pen test very similar to those of the Cyber Kill Chain?
- Planning and Gathering Info: Both gather information about the target.
- Scanning and Preparing: Pen tests scan for vulnerabilities similar to attackers preparing their attack.
- Exploiting Weaknesses: In pen tests we exploit vulnerabilities like attackers exploiting weaknesses.
- Maintaining Access: Aim to keep access to the system.
- Assessing Impact: Assess the impact of the attack or test.
Your manager has asked you to explain the benefits of a pentest to the company’s leadership. How would you lead this conversation?
I would explain to my leadership the following benefits of penetration testing, which are the following:
- Find and Fix Issues: It helps us find and fix problems before bad actors can use them.
- Meet Rules: We meet industry rules and regulations, avoiding penalties and showing we take security seriously.
- Protect Data: It safeguards sensitive data like customer information.
- Prepare for Incidents: It helps us get ready for real attacks by testing our response.
- Save Money: It's cost-effective, preventing expensive data breaches.
- Raise Awareness: It makes our staff more security-aware.
- Keep Getting Better: Pen testing is ongoing, keeping us ahead of evolving threats.
References:
https://www.imperva.com/learn/application-security/penetration-testing/