Antonio Jose Segovia
January 18, 2016
A famous historical hacker, Kevin Mitnick, said on one occasion: “I get hired by companies to hack into their systems and break into their physical facilities to find security holes. Our success rate is 100%; we have always found a hole.”
So, probably the question now on your mind is – could that be avoided? Mr. Mitnick would say no, but one should not give up because of that. Something could be done to minimize (or eliminate) the possibility of breaking into the IT environment. Basically, if you know what your vulnerabilities are before your attackers do, you will be more protected, so let me explain this in more detail.
Basically, when you perform a vulnerability analysis on your information systems, you can identify all technical vulnerabilities related to them (e.g., SQL Injection, XSS, CSRF, weak passwords, etc.). But, for their exploitation, you need to perform a penetration test.
Let me explain the above. Imagine that you have a system that is vulnerable to SQL Injection (method to perform operations in a database).Vulnerability analysis will identify that vulnerability. After vulnerability analysis, the penetration testing can be performed and the vulnerability can be exploited. This means that you can access the vulnerable system and you can have access to, or even modify or delete, confidential information (information in the database about clients, providers, etc.).
On the other hand, in accordance with control A.12.6.1 of Annex A of ISO 27001:2013, you need to prevent the exploitation of technical vulnerabilities. How to do it? With the vulnerability analysis or with the penetration testing?Or, back to the previous example: for the prevention of the exploitation of the vulnerability related to the system, do we need to perform the penetration testing? The answer is – not necessarily, because after the vulnerability analysis we know that the system is vulnerable, and by fixing it we can avoid the SQL Injection vulnerability. So, the next step, exploiting it, is not necessary.
So, if you want to comply with ISO 27001:2013 you can perform only the vulnerability analysis, although the penetration testing is a best practice, and is highly recommended if you want to know how vulnerable your systems are (in our example, we want to know what information could be seen by an unauthorized person).
If you are thinking about performing penetration testing to improve your ISO 27001 implementation, there are many utilities and platforms you can use to automate it, but my recommendation is that you follow these phases:
Figure – Phases of the penetration testing
By the way, are you interested in the vulnerability analysis? This article might be very interesting for you: How to manage technical vulnerabilities according to ISO 27001 control A.12.6.1.
Another important question is how to define the type of penetration testing. Basically, there are two main types:
There is another possibility that is a mix of black box and white box: the gray box (the organization can give you some information about their systems).
There are many people (hackers and experts of any type) all over the world constantly scanning the Internet searching for vulnerable systems, and it is impressive the amount of vulnerable equipment that you can find with only a search engine. So, do not wait –perform a vulnerability analysis, and if you want to be more secure – perform a penetration testing. And, remember that the implementation of ISO 27001 will help you to perform vulnerability analysis (mandatory) and penetration testing (best practice) in your organization, which means that top management will be much quieter.
To learn how to become compliant with every clause and control from Annex A and get all the required policies and procedures for controls and clauses, sign up for a 14-day free trial of Conformio, the leading ISO 27001 compliance software.