2023年滲透測(cè)試報(bào)告(英)_第1頁
2023年滲透測(cè)試報(bào)告(英)_第2頁
2023年滲透測(cè)試報(bào)告(英)_第3頁
2023年滲透測(cè)試報(bào)告(英)_第4頁
2023年滲透測(cè)試報(bào)告(英)_第5頁
已閱讀5頁,還剩32頁未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

2023

PenetrationTesting

Report2023Penetration

TestingReportIntroductionSincepenetrationtestingencompassesagreatvarietyofsecurityassessments,tools,andservices,thereisnosetformulaforthecreationandmaintenanceofapentestingstrategy.For

thosewantingtosuccessfullyincorporatepentestingintotheirowncybersecurityprogram,thiscanpresentachallenge,withnoclearplacetolooktoasaguidingexample.????In-housepentestingteame?ortsandchallengesUsingandselectingthird-partyteamsEvaluatingpentestingtoolsetsIntegratingpentestingwithothersecurityassessmenttoolsWe’ll

showacomparisontotheresultsofthe2022surveyanduncovernewinsights,analyzingthegeneralevolutionandadvancementofthepenetrationtesting?eld.In

general,cybersecurityhasbecometiedtoanorganization’sreputation,withabreachhavingthepotentialtoseverelydamagetheirstanding.Unfortunately,thiscancreateanenvironmentinwhicheveryoneisreticenttoshareanyaspectoftheirsecurityjourney.However,

knowledgesharingandanalysisisacriticalpartofde?ningbestpracticesandpresentingaunitedfrontagainstthreatactors.

Withoveradecadeofspecializedexperience,Fortra’sCoreSecuritydevelopedapenetrationtestingsurveyinordertogetabetterpictureofhowcybersecurityprofessionalsareusingpenetrationtestinginthe?eld,includingpentestingstrategiesandtheresourcesrequiredtodeployasuccessfulpentestingprogram.Nowinitsfourthyear,

thissurveycontinuestotrackyear-over-yearchanges,trends,challenges,andareasofimprovement.

Thedatacollectedprovidesvisibilityintothefullspectrumofpentesting’srole,helpingtodeterminehowtheseservices,tools,andskillsmustevolve.

Thisyear,

we

continuetoseeslightshiftsintherolepenetrationtestingplaysinthecybersecuritylandscapeandidentifyhowbroadertrends,liketheglobaleconomy,canin?uenceitsrole.Theresultsareexploredindetailinthisreport,providingvaluabledataonthefollowingkeyissuesrelatedtopentesting:?Top

securityconcernslikeransomware,phishing,andmiscon?gurations???Testing

frequencyandremediationComplianceconcernsPen

testingindi?erentenvironmentsF22023Penetration

TestingReportReasons

for

Pen

TestingOrganizationspentestformultiplereasons,with69%reportingtheyperformpentestsforriskassessmentandremediationprioritization,62%forvulnerabilitymanagementprogramsupport,58%forcomplianceandexternalmandates,and40%forinternalorcompanyspeci?cmandates(Figure1).Riskassessmentandremediationprioritizationarefoundationalo?ensivesecuritypractices,helpingidentifysecurityweaknessesinanITenvironmentanddeterminingwhichhavethemostpotentialforharm.

Thisprovidesguidancefororganizationsonwheretoallocateresourcesformitigation.

Thoserespondentswhoreportedsolelyusingpentestingforriskassessmentandremediationprioritizationmayberelyingonamoreadhocsecurityapproach.However,

riskassessmentisakeycomponentofanyvulnerabilitymanagementprogram,whichisanestablishedstrategyofidentifying,classifying,prioritizing,andremediatingweaknessesinanITenvironment.

Whileapenetrationtestwillalwaysprovidehelpfulinsights,organizationscanachievemorewithaformalizedprogram,inwhichtoolscanworkintandemtoprovidemaximumcoverageandimpact.Externalandinternalmandatesarealsorelatedtooneanother,inthattheybothsetcybersecuritystandardstowhichorganizationsmustadhere.

Thekeydi?erenceisthatexternalmandatesaresetbyregulatorybodies,governmentagencies,orsomeotherentitywhileinternalmandatesarecompanyspeci?c.Becauseexternalmandatesareenforceablebylawandcanimpose?nesorotherconsequences,theyaretypicallygivenpriorityoverinternalmandates,whichthedataseemstosuggest.However,

itisstillworthhavinginternalmandates,astheyarewrittenwiththespeci?cneedsoftheorganizationinmindandoftengobeyondthebaselineofcybersecuritythatissetbyexternalregulations.F32023Penetration

TestingReportReasons

for

Pen

TestingWhydoesyourorganizationperformpenetrationtests?69%62%58%40%8%RiskassessmentandremediationprioritizationVulnerabilitymanagementprogramsupportComplianceorexternalmandatesInternalorcompanyspeci?cmandatesOtherFigure

1:ReasonsforperformingpenetrationtestsF42023Penetration

TestingReportCommon

Security

ConcernsRansomware(72%),phishing(70%),andmiscon?gurations(58%)wereonceagainthetopsecurityconcerns(Figure2)forsurveyrespondents.Accordingto

Verizon’s

2022

Data

Breach

InvestigationsReport,therewasa13%increaseinransomwarebreaches,accountingfor25%ofallbreaches.

Withransomwareonaseeminglyendlessupwardtrajectory,it’s

unsurprisingthatitisthemostcommonconcernthisyear.

Ransomwareisalsocloselylinkedwithphishing,withphishingemailsservingasthenumber

one

deliverymethodforransomwarepayloads.Alloftheseconcernsshareonethingincommon:theinescapablethreatthatemployeesinadvertentlyposetoorganizations.Additionally,unintentionalinternalthreats(54%)werethefourthtopconcern(Figure2).

Thisisalargecategoryofthreatsthatconsistofanyactionsfromemployees,contractors,orthird-partyvendorsthatinadvertentlyresultinsecurityincidents.

Thismayincludemiscon?gurations,failuretofollowsecuritypolicies(i.e.strongpasswords,ignoringsoftwareupdates,etc.),orevenlosingone’semployeeIDcard.Thoughpartofthebroadercategoryofunintentionalinternalthreats,miscon?gurationswereactuallyaslightlybiggerconcernforrespondents.

Thismaybeduetohowwidespreadthey’vebecome.AsITinfrastructurescontinuetogrowincomplexity,thereisthatmuchmorepotentialforerrorsandoversightsinthecon?gurationofhardware,software,ornetworksettings.Unfortunately,miscon?gurationsthrowthedoorforattackerswideopen,andwereultimatelyresponsiblefor14%ofallbreachesin2022.Supplychainattacks(44%),inwhichamaliciousactorcompromisesanoutsidepartnerorsuppliertoconductattacksagainstthesupplier’scustomers,canalsooccurasaresultofunintentionalinternalthreats.

Thisstrategyisincreasinglypopularamongstattackers.Infact,the

Verizonreportstatedthat61%ofsystemintrusionincidentsweresupplychainattacks.Unsurprisingly,ransomwareisoften

used

insupplychainattacks,makingtheconcernarounditallthemorejusti?ed.F52023Penetration

TestingReportCommon

Security

ConcernsWhatcommonsecurityrisks/entrypointsareyoumostconcernedabout?2022202380%68%72%70%57%

58%55%54%55%43%49%44%43%29%26%26%25%17%n/an/an/an/aRansomwarePhishingMiscon?gu-rationsInternalThreatsInternalThreatsLackofpatchingSupplychaincompromiseWeakpasswordsLackofencryptionLost/stolendevicesOrphanedaccounts(unintentional)

(intentional)Figure

2:CommonsecurityconcernsF62023Penetration

TestingReportGeneral

Pen

Testing

ChallengesFeelingsonthevalueofpenetrationtestingremainthesame,with94%ofrespondentsonceagainnotingthatpenetrationtestingisatleastsomewhatimportanttotheirsecurity(Figure4).ifallappearswell.However,

cybersecurityrequiresconstantappraisaland?exibility,readjustingandpivotingasattackers?ndnewtechniques,tactics,andvulnerabilities.

This15%dropcouldre?ectthattherealityofthecurrentthreatlandscapeissettingin.Whiletheviewontheimportofpentestingremainedsteady,thereweresomechangesinthechallengesthatarebeingencounteredinpentesting.First,troublegettingaquali?edthird-partyisnotablyreduced,down15%from2022(Figure3).Pen

testingisarapidlygrowingmarket,withresearchpredictingtoseeamarketgrowthof$2.6

billion

by2030.

Thismeansmorethird-partyserviceo?eringstochoosefromeveryyear.

However,

suchgrowthmakesitworthexercisingextremecautionwhenchoosingaserviceprovider,asthequalitywillvarygreatly.Manyfocusonbasic,routineteststhatareperformedwithapentestingtool,packagingitasacustomservice.It’s

criticalto?ndapartnerwithexpertsthatcantailortheirtestsforyourneedsandgoals,andevenadviseyouonthedi?erenttestingoptions.Therewasalsoaconcerningincreaseinthelackofresourcestoactonthe?ndingsofapentest,up23%fromlastyear(Figure3).

Whilepentestingisane?ectivemeansofdeterminingthequalityofanorganization’ssecurityand?aggingwhichweaknessesareputtingyoumostatrisk,theonlywaytoimproveyoursecuritypostureistofollowthroughwithactionsthatclosethosesecuritygaps,suchaspatching,recon?guration,orimplementingnewpolicies.Penetrationtestingshouldnotbeseenasaboxtocheck,butratheramapthatneedstobefollowed.Equallyimportantisrepeatingpentestsaftertheremediationprocesstovalidatethat?xeswereproperlyimplemented.Lastly,whilethe15%dropinsecurityposturecon?dence(Figure3)mayappearconcerningat?rstglance,itisactuallybesttoerronthesideofcautionwhenitcomestocybersecurity.Overcon?denceoftentranslatesintostagnationandrigidity,feelingnoneedtoreevaluateF72023Penetration

TestingReportGeneral

Pen

Testing

ChallengesWhatchallenge(s)doesyourorganizationfacewithyourpenetrationtestingprogram?2022202358%45%38%36%35%31%29%30%12%10%TroublegettingexecutivesponsorshipandfundingfortheprogramInabilitytohireLackofquali?edthirdpartiestodothetestingLackofresourcestoacton?ndings/per-formremediationOtherenoughskilledpersonneltodothetesting(internal)Figure

3:PentestingchallengesF82023Penetration

TestingReportGeneral

Pen

Testing

ChallengesHowimportantispenetrationtestingtoyourorganization’ssecurityposture?20222023Howcon?dentareyouinyourorganization’ssecurityposture?2022202376%73%56%53%43%38%21%18%6%

6%6%4%NotimportantSomewhatimportantImportantCon?dentSomewhatcon?dentNotatallcon?dentFigure

4:ImportanceofpenetrationtestingFigure

5:Con?denceinsecuritypostureF92023Penetration

TestingReportCompliance

and

Pen

TestingRegulationslikeHIPAA,

PCIDSS,SOX,

GDPR,ortheCMMCmandateappropriate

protectionofhighlysensitive

data,

likecredit

cardnumbers,

socialsecuritynumbers,

andotherpersonallyidentifyinginformation.

Pen

tests

are

notonlya

way

to

evaluate

anorganization’ssecurity

posture,

buttheycanalsohelpverify

adherence

to

theseregulations,

proving

to

auditors

orotherauthoritiesthat

mandatedsecurity

measures

are

inplace

orworking

properly.complianceneeds,illustratingthein?uencecompliancecontinuestohaveonpentestingapproaches.Howimportantispenetrationtestingtoyourcomplianceinitiatives?20222023Thoughtherewasadeclinefromlastyear,

pentestingwasstillatleastsomewhatimportanttocomplianceinitiativesfor93%ofrespondents(Figure6).Interestingly,withanincreaseinthenumberofdataprotectionandsecuritylawsandregulations,pentestneedssurroundingcomplianceonlyseemtobegrowing.41%ofrespondentshaveincreasedthenumberofoverallpentestsinresponsetothesemandates(Figure7).71%62%Complianceinitiativesshownosignsofslowing,either.

TheEuropeanCommission

isrevisingtheGDPRin2023tostreamlinecross-borderinstancesofdataprotectionenforcement.Notonlyareexistingregulationsbeingcontinuallyupdatedtoincorporatenewmeasures,newlawsandregulationsarealsoemerging.For

example,in2022,nearly

every

US

state

putforthcybersecuritybills.Additionally,the2023

National

Cybersecurity

Strategy

includesaproposaltoexpandrequirementsforalloperatorsofcriticalinfrastructure.AccordingtoGartner,threequartersoftheworld’s

populationwillbeunderprivacyregulationsin2023.25%31%Whilesomehadtoincreasethenumberofpentestsinresponsetocomplianceinitiatives,othershadtoshifttheirstrategiesinsomeotherway,

whetheritwasexpandingthescopeoftheirtests(29%),addingmoreinternalsta?(23%),orplacingmoreemphasisoncertaintypesoftests,likewebapplication(35%)orsocialengineering(36%)(Figure7).Only16%ofrespondentsreportedthattherewasnoimpacttotheirpentestingstrategiesasaresultof7%4%ImportantSomewhatimportantNotimportantFigure

6:ImportanceofpenetrationtestingforcomplianceF102023Penetration

TestingReportCompliance

and

Pen

TestingHowhastheincreaseincomplianceregulation/mandatesa?ectedyourpentestingstrategyorpriorities?41%36%35%32%29%27%25%23%16%16%4%IncreasedquantityofpentestsoverallMoreemphasisonsocialMoreemphasisonwebMoreBroadenedAddedConductedAddedMoreemphasisonNoimpactOtheremphasisthescopeofadditional

morenarrowly

additionalonnetwork

ourpentests

third-partyscopedpen

internalsta?

IoT

Securityengineering/

application

securitytestsphishing

testspenteststestsTestsFigure

7:ImpactofcompliancemandatesonpentestingstrategiesF112023Penetration

TestingReportPhishingWiththeAnti-Phishing

Working

Groupobservingarecord1,270,883totalphishingattacksinQ3of2022alone,it’s

unsurprisingthatphishingisatopsecurityconcernofrespondents(70%)(Figure2).Howoftendoesyourorganizationconductphishingsimulations?20222023Sincephishingisoneoftheoldestattacktacticsaround,howhasitremainedsopervasive?Ultimately,it’s

thehumanelementofphishingthathaskeptitremarkablye?ective.Peoplereceivesomanymessagesandemailsthatit’s

easytobecomecareless,clickingonlinkswhileyourmindiselsewhere.Othersoverlyrelyonspam?lters,whichattackershavebecomeadeptatevading.Spearphishingtechniqueshavealsoimproved,witheverythingseeminglypersonalizedandappearingsoauthenticthatevenacybersecurityprocouldbefooled.23%Ongoing19%15%23%MonthlyQuarterlyAnnuallyNeverThoughphishingattackswillpersevere,oneofthebestdefensesistokeeppeopleontheirtoes.Runningregularphishingsimulationexercisescanhelpserveasaregularinitiativetokeepusersvigilantandtrainthemtoexercisemoreprecaution.24%25%Withthisinmind,itwasencouragingtoseean8%increaseinmonthlyphishingsimulations(Figure8),whichisagoodcadencetopromoteongoingawareness.Newandexistingregulationshavealsounderscoredthethreatphishingposes,with36%ofrespondentsnotingthatcomplianceinitiativeshaveplacedanincreasedemphasisonsocialengineeringtests(Figure7).

Thismayalsobere?ectedinthe16%increaseintheusageofthird-partytestingservicesforsocialengineeringtests(Figure19).20%17%18%16%Withgenerative

AI

makingsophisticatedphishingemailsandtextsthenorm,easywaystospotattackslikespellingandgrammarerrorsmaysoonbecomeathingofthepast.Instead,usersneedtoquestiontheintentoftheemailandwhethertherequestmakessense.Doyouoftenreceiveemailsfromthisperson?Isthishowanapplicationallowsasksyoutoauthenticateyourcredentials?Byrunningroutinephishingsimulationcampaignswithfollowupreportsandtrainings,organizationscanfosteracultureofhealthyskepticism.010

2030

40

50

60

7080

90

100Figure

8:FrequencyofphishingsimulationsF122023Penetration

TestingReportPenetration

Testing

FrequencyResultsforpentestingfrequencyhaveremainedconsistent.Asin2022,themajorityofrespondentsare,atmost,pentestingonlyafewtimesayear.

Whilerunningonetotwopentests(38%)isfarbetterthannothing(14%)(Figure9),itdoesraiseconcernsaboutretesting.Aninitialtestprovidesguidanceonremediation,butaretestiscriticalforensuringthesevulnerabilitieshavebeensuccessfullymitigated.Improperlyapplyingapatchmaynotjustleavethevulnerabilityintact,itcanalsoopennewsecuritygaps.Remediationvalidationshouldnotjustbeleftforthenextyear’s

roundoftesting.However,

whenresourcesarelimited,makingabusinesscaseforretestingmayprovedi?cult.

Thisalignswiththe?ndingofrespondentsencounteringchallengeswiththelackoffollowup(58%)frompentests(Figure3).Howoftendoesyourorganizationpentest?2022202313%Never14%10%DailyWeekly8%7%8%Runningtoofewtestsisn’t

ideal,butrunningdailyorevenweeklypentestsmaybeimpractical,sincetheydorequirethealreadyscarceresourcesoftime,budget,andtalent.Inordertorundailypentests,youwouldneedtohavealargepentestingteam.Eventhen,theywouldlikelyonlybeabletorunsmallerpentestsondi?erentpartsoftheinfrastructure—runningalargescopepentesteverysingledaywouldbeadi?cultchallenge.However,

though8%ofrespondentsreporteddailypentesting(Figure9),just50%ofthoserespondentshadinternalteamsofmorethan?veteammembers.For

theother50%,itmaybethattheyareinsteadreferringtothefrequencywithwhichvulnerabilityscansarebeingrun.

Vulnerabilitymanagementsolutionsaretypicallyhighlyautomatedandcaneasilybescheduledtorunonadailybasis,whilepentestingrequiresmoreadvanced11%12%17%20%MonthlyQuarterly42%38%planning.1-2timesayearThoserunningmonthly(12%)orevenquarterly(20%)tests(Figure9)aremorelikelytohaveachievedabalance,havingthemeansfortestingandretestingwithoutplacingastrainonresources.However,penetrationtestingfrequencyisaperfectexampleofwherebestpracticescollidewithrealworldpracticalities.Everysecurityteamwillhavetodeterminetheirneedswhilekeepingresourcesandbudgetsinmind.010

2030

40

50

60

7080

90

100Figure

9:FrequencyofpenetrationtestingF132023Penetration

TestingReportIn-House

Penetration

Testing

E?ortsHavingpentestingcapabilitiesin-housecanquicklyexpandpentestinge?orts,allowingformorefrequenttestsandcoverageofawiderscopeoftheITinfrastructure.It

alsoensuresthatchangestotheinfrastructurearemoree?cientlyassessedtoensurenewsecuritygapsaren’t

opened.

Thisyearshowsasmallamountgrowthofin-housepentestinge?orts,witha7%increasefromlastyearinthenumberofrespondentswhohaveaninternalpentestingteamattheirorganization(Figure10).Curiously,thesizeofpentestingteamsseemstobe?uctuating,withteamsbothgrowingandshrinking.

Whilethereisa21%increaseinthenumberofteamswith3-5members,thereisan11%decreaseinthenumberofteamswith1-2membersand10%decreaseinteamsof6ormore

(Figure11).Thedecreaseinlargerteamsmaybeillustrativeofthecybersecurityskillsgap,whichcontinuestopersist.Infact,accordingto(ISC)2’s2022

Cybersecurity

Workforce

Study,thecybersecurityworkforcegaphasgrownmorethantwiceasmuchastheworkforcewitha26.2%year-over-yearincrease.In

a?eldwithsomanyjobopenings,itwouldn’tbeuncommonfortheretobemoreturnoverandinstabilityinteamsize.Pen

testingtoolsmaybehelpingo?settheskillsgap,witha14%increaseinthenumberofrespondentswhocitedthatpentestingtechnologyhasatleastsomein?uenceonanorganization’sdecisiononhavinganin-houseteam(Figure14).Whiletherewasanincreaseinthenumberofrespondentswithin-housepentestingteams,therewerestillmorerespondentswhoeitherhadlosttheirin-houseteamorneverhadonetobeginwith.Reasonsforthelackofanin-houseteamvary,withtopreasonsbeinginsu?cientneed(48%),lackoftalent(36%),andlackoffunding(28%)(Figure13).Interestingly,thereisa12%decreaseinrespondentscitinginsu?cientneedforafull-timepentestingteam.Thismayre?ectagrowingacknowledgementoftheusefulnessofin-housepentestingteams,orevenpentestingingeneral.F142023Penetration

TestingReportIn-House

Penetration

Testing

E?ortsDoyouhaveanin-housepenetrationtestingteam?20222023Howmanydedicatedteammembersdoesyourin-housepenetrationtestingteamhave?2022202353%48%41%41%42%40%37%19%18%14%14%11%14%7%YesNo,butwehaveinthepastNo,we'veneverhadanin-housepenetrationtestingteam1-23-56-10Morethan11Figure

10:In-housepenetrationtestingFigure

11:In-housepentestingteamsizeF152023Penetration

TestingReportIn-House

Penetration

Testing

E?ortsWhatistheaveragenumberofyearsofexperienceyourin-houseteamhaswithpenetrationtesting?2022202356%34%32%24%22%19%3%10%1yearorless2-3years4-5years6ormoreyearsFigure

12:Yearsofexperienceofin-housepentestingteamF162023Penetration

TestingReportIn-House

Penetration

Testing

E?ortsWhydoesyourorganizationnothaveanin-housepenetrationtestingteam?2022202360%48%36%34%28%

28%30%19%22%19%4%8%LackoffundingNotenoughneedtoemployafull-timepentester/teamLackofexecutivesponsorshipLackoftalent/skillsetLeveragethirdpartiesexclusivelyOtherFigure

13:Reasonsfornothavinganin-housepentestingteamF172023Penetration

TestingReportIn-House

Penetration

Testing

E?ortsHowdoespenetrationtestingtechnologyin?uenceyourorganization’sdecisiontohaveornothaveanin-housepenetrationtestingfunction?2022202347%46%37%32%21%17%Strongin?uenceSomein?uenceNoin?uenceFigure

14:In?uenceofpentestingtechnologyF182023Penetration

TestingReportThird-Party

ServicesThird-partypentestingteamsremainapopularresource,with78%ofrespondentsleveragingthird-partyteamsinsomecapacity(Figure18).However,

therewasanoteworthyshiftindicatinganincreasedpreferenceforin-housetesting,witha16%dropinthosewhousedmostlyorexclusivelythird-partyservicesanda13%increaseinthosewhouseallormostlyin-housetesting(Figure18).

Thoughmanyassumeanin-houseteamismeantasareplacementforthird-partyservices,organizationsshouldideallyuseboth,soitwaspromisingtoseeevenamodest5%increaseinthosewhohaveanevensplitbetweenin-houseandthird-party.Lastly,thoughtheyareusedmostoftenfornetwork(81%)andapplication(65%)testing,itisworthpointingoutthatthird-partiesareutilizedby36%ofrespondentsforphysicalpentests(Figure19).Thesetestsinvolveattemptingtogainentrytoaphysicalfacility,system,ornetworkthroughtheexploitationofweaknesseslikedoors,locks,cameras,orotheraccesscontrols.Suchassessmentscanonlybecompletedbythird-parties,furtherhighlightingtheuniqueservicestheycanprovide.Whatmakesanevensplitideal?

Whileaninternalpentestingteamcanprovideregular,standardizedtesting,theyalsobecomequitefamiliarwiththeenvironmentthatthey’reassessing.

Thetopreasonthird-partyservicesaresolicitedisbecauseoftheirexternal,objectivepointofview(58%)(Figure15).Additionally,sincethird-partyteamsarefullyimmersedspecialiststhatcanstayuptodateonthelatesttrendsandtechniques,theyarealsofrequentlyutilizedtoapplydi?erentskillsets(50%).

Wantinganimpartialassessmentandadiversityofskillsmayalsobeareasonforwhy76%oforganizationstendtochangeservicesatleastevery2-3years(Figure17).Therewasa13%dropintheuseofthird-partyservicesforcompliance.Asmentionedearlier,complianceregulationsareexpandinginnumberandcomplexity,sothismaybemoreofare?ectionofteamsmanagingtheircomplianceneedsinternallyratherthanoutsourcing.Manyfalselyassumethatinordertomeetcomplianceneeds,third-partytestingisrequired.However,

thistypicallyisnotthecase.In

fact,PCIDSS,whichhassomeofthemostexplicitrequirementsforpentesting,doesnotstatethatathird-partytestisnecessary.Someorganizations?ndthird-partyservicesidealfordeterminingcomplianceneedsandobtainingstrategicsupportwithinitialtests.

Theythenusepentestingtoolstomaintaincompliance.F192023Penetration

TestingReportThird-Party

ServicesWhydoesyourorganizationutilizethird-partypenetrationtesters?2022202363%58%58%56%50%45%38%32%6%4%Togainanexternal,objectivepointofviewTomeetcompliancerequirementsToapplydi?erentskillsetstotheenvironmentNotenoughskilledpersonnelinternallytodothetestingOtherFigure

15:Reasonsforutilizingthird-partypentestingservicesF202023Penetration

TestingReportThird-Party

ServicesHowoftendoyouconductthird-partypenetrationtests?2022202355%54%22%19%7%7%8%12%12%

5%3%4%OngoingMonthlyQuarterlyAnnuallyEvery2-3yearsEvery3+yearsFigure

16:Frequencyofthird-partypentestsF212023Penetration

TestingReportThird-Party

ServicesHowoftendoyouchangewhichthird-partypentestingserviceyouworkwith?2022202341%24%20%23%18%14%14%12%Never,weusethesameoneeverytimeEvery2-3yearsAnnuallyEverypentestweconductFigure

17:Rotationfrequencyofthird-partypentestingservicesF222023Penetration

TestingReportThird-Party

ServicesWhatisthecurrentsplitbetweenusinginternalandthird-partypentestingresources?2022202327%24%22%23%20%18%17%18%17%14%AllinternalMostlyinternalEvenlysplitMostlythird-partyAllthird-partyFigure

18:Splitbetweeninternalandthird-partypentestingservicesF232023Penetration

TestingReportThird-Party

ServicesWhchtypesofpenetrationtestsdoyouutilizethird-partytestersfor?2022202381%

81%68%65%48%46%44%36%33%30%23%22%4%3%NetworktestingApplicationtestingSocialengineeringCloudsecurityPhysicalpenetrationtestingIoTsecuritytestingOtherFigure

19:Typesofpenteststhird-partytestersarerequestedtoperformF242023Penetration

TestingReportOther

SecurityAssessment

ServicesDoyouuseanyoftheseothersecurityassessmentservices?Justasorganizationsmayhavecomplementarysolutionsintheiro?ensivesecuritytoolkit,th

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論