




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
2023
PenetrationTesting
Report2023Penetration
TestingReportIntroductionSincepenetrationtestingencompassesagreatvarietyofsecurityassessments,tools,andservices,thereisnosetformulaforthecreationandmaintenanceofapentestingstrategy.For
thosewantingtosuccessfullyincorporatepentestingintotheirowncybersecurityprogram,thiscanpresentachallenge,withnoclearplacetolooktoasaguidingexample.????In-housepentestingteame?ortsandchallengesUsingandselectingthird-partyteamsEvaluatingpentestingtoolsetsIntegratingpentestingwithothersecurityassessmenttoolsWe’ll
showacomparisontotheresultsofthe2022surveyanduncovernewinsights,analyzingthegeneralevolutionandadvancementofthepenetrationtesting?eld.In
general,cybersecurityhasbecometiedtoanorganization’sreputation,withabreachhavingthepotentialtoseverelydamagetheirstanding.Unfortunately,thiscancreateanenvironmentinwhicheveryoneisreticenttoshareanyaspectoftheirsecurityjourney.However,
knowledgesharingandanalysisisacriticalpartofde?ningbestpracticesandpresentingaunitedfrontagainstthreatactors.
Withoveradecadeofspecializedexperience,Fortra’sCoreSecuritydevelopedapenetrationtestingsurveyinordertogetabetterpictureofhowcybersecurityprofessionalsareusingpenetrationtestinginthe?eld,includingpentestingstrategiesandtheresourcesrequiredtodeployasuccessfulpentestingprogram.Nowinitsfourthyear,
thissurveycontinuestotrackyear-over-yearchanges,trends,challenges,andareasofimprovement.
Thedatacollectedprovidesvisibilityintothefullspectrumofpentesting’srole,helpingtodeterminehowtheseservices,tools,andskillsmustevolve.
Thisyear,
we
continuetoseeslightshiftsintherolepenetrationtestingplaysinthecybersecuritylandscapeandidentifyhowbroadertrends,liketheglobaleconomy,canin?uenceitsrole.Theresultsareexploredindetailinthisreport,providingvaluabledataonthefollowingkeyissuesrelatedtopentesting:?Top
securityconcernslikeransomware,phishing,andmiscon?gurations???Testing
frequencyandremediationComplianceconcernsPen
testingindi?erentenvironmentsF22023Penetration
TestingReportReasons
for
Pen
TestingOrganizationspentestformultiplereasons,with69%reportingtheyperformpentestsforriskassessmentandremediationprioritization,62%forvulnerabilitymanagementprogramsupport,58%forcomplianceandexternalmandates,and40%forinternalorcompanyspeci?cmandates(Figure1).Riskassessmentandremediationprioritizationarefoundationalo?ensivesecuritypractices,helpingidentifysecurityweaknessesinanITenvironmentanddeterminingwhichhavethemostpotentialforharm.
Thisprovidesguidancefororganizationsonwheretoallocateresourcesformitigation.
Thoserespondentswhoreportedsolelyusingpentestingforriskassessmentandremediationprioritizationmayberelyingonamoreadhocsecurityapproach.However,
riskassessmentisakeycomponentofanyvulnerabilitymanagementprogram,whichisanestablishedstrategyofidentifying,classifying,prioritizing,andremediatingweaknessesinanITenvironment.
Whileapenetrationtestwillalwaysprovidehelpfulinsights,organizationscanachievemorewithaformalizedprogram,inwhichtoolscanworkintandemtoprovidemaximumcoverageandimpact.Externalandinternalmandatesarealsorelatedtooneanother,inthattheybothsetcybersecuritystandardstowhichorganizationsmustadhere.
Thekeydi?erenceisthatexternalmandatesaresetbyregulatorybodies,governmentagencies,orsomeotherentitywhileinternalmandatesarecompanyspeci?c.Becauseexternalmandatesareenforceablebylawandcanimpose?nesorotherconsequences,theyaretypicallygivenpriorityoverinternalmandates,whichthedataseemstosuggest.However,
itisstillworthhavinginternalmandates,astheyarewrittenwiththespeci?cneedsoftheorganizationinmindandoftengobeyondthebaselineofcybersecuritythatissetbyexternalregulations.F32023Penetration
TestingReportReasons
for
Pen
TestingWhydoesyourorganizationperformpenetrationtests?69%62%58%40%8%RiskassessmentandremediationprioritizationVulnerabilitymanagementprogramsupportComplianceorexternalmandatesInternalorcompanyspeci?cmandatesOtherFigure
1:ReasonsforperformingpenetrationtestsF42023Penetration
TestingReportCommon
Security
ConcernsRansomware(72%),phishing(70%),andmiscon?gurations(58%)wereonceagainthetopsecurityconcerns(Figure2)forsurveyrespondents.Accordingto
Verizon’s
2022
Data
Breach
InvestigationsReport,therewasa13%increaseinransomwarebreaches,accountingfor25%ofallbreaches.
Withransomwareonaseeminglyendlessupwardtrajectory,it’s
unsurprisingthatitisthemostcommonconcernthisyear.
Ransomwareisalsocloselylinkedwithphishing,withphishingemailsservingasthenumber
one
deliverymethodforransomwarepayloads.Alloftheseconcernsshareonethingincommon:theinescapablethreatthatemployeesinadvertentlyposetoorganizations.Additionally,unintentionalinternalthreats(54%)werethefourthtopconcern(Figure2).
Thisisalargecategoryofthreatsthatconsistofanyactionsfromemployees,contractors,orthird-partyvendorsthatinadvertentlyresultinsecurityincidents.
Thismayincludemiscon?gurations,failuretofollowsecuritypolicies(i.e.strongpasswords,ignoringsoftwareupdates,etc.),orevenlosingone’semployeeIDcard.Thoughpartofthebroadercategoryofunintentionalinternalthreats,miscon?gurationswereactuallyaslightlybiggerconcernforrespondents.
Thismaybeduetohowwidespreadthey’vebecome.AsITinfrastructurescontinuetogrowincomplexity,thereisthatmuchmorepotentialforerrorsandoversightsinthecon?gurationofhardware,software,ornetworksettings.Unfortunately,miscon?gurationsthrowthedoorforattackerswideopen,andwereultimatelyresponsiblefor14%ofallbreachesin2022.Supplychainattacks(44%),inwhichamaliciousactorcompromisesanoutsidepartnerorsuppliertoconductattacksagainstthesupplier’scustomers,canalsooccurasaresultofunintentionalinternalthreats.
Thisstrategyisincreasinglypopularamongstattackers.Infact,the
Verizonreportstatedthat61%ofsystemintrusionincidentsweresupplychainattacks.Unsurprisingly,ransomwareisoften
used
insupplychainattacks,makingtheconcernarounditallthemorejusti?ed.F52023Penetration
TestingReportCommon
Security
ConcernsWhatcommonsecurityrisks/entrypointsareyoumostconcernedabout?2022202380%68%72%70%57%
58%55%54%55%43%49%44%43%29%26%26%25%17%n/an/an/an/aRansomwarePhishingMiscon?gu-rationsInternalThreatsInternalThreatsLackofpatchingSupplychaincompromiseWeakpasswordsLackofencryptionLost/stolendevicesOrphanedaccounts(unintentional)
(intentional)Figure
2:CommonsecurityconcernsF62023Penetration
TestingReportGeneral
Pen
Testing
ChallengesFeelingsonthevalueofpenetrationtestingremainthesame,with94%ofrespondentsonceagainnotingthatpenetrationtestingisatleastsomewhatimportanttotheirsecurity(Figure4).ifallappearswell.However,
cybersecurityrequiresconstantappraisaland?exibility,readjustingandpivotingasattackers?ndnewtechniques,tactics,andvulnerabilities.
This15%dropcouldre?ectthattherealityofthecurrentthreatlandscapeissettingin.Whiletheviewontheimportofpentestingremainedsteady,thereweresomechangesinthechallengesthatarebeingencounteredinpentesting.First,troublegettingaquali?edthird-partyisnotablyreduced,down15%from2022(Figure3).Pen
testingisarapidlygrowingmarket,withresearchpredictingtoseeamarketgrowthof$2.6
billion
by2030.
Thismeansmorethird-partyserviceo?eringstochoosefromeveryyear.
However,
suchgrowthmakesitworthexercisingextremecautionwhenchoosingaserviceprovider,asthequalitywillvarygreatly.Manyfocusonbasic,routineteststhatareperformedwithapentestingtool,packagingitasacustomservice.It’s
criticalto?ndapartnerwithexpertsthatcantailortheirtestsforyourneedsandgoals,andevenadviseyouonthedi?erenttestingoptions.Therewasalsoaconcerningincreaseinthelackofresourcestoactonthe?ndingsofapentest,up23%fromlastyear(Figure3).
Whilepentestingisane?ectivemeansofdeterminingthequalityofanorganization’ssecurityand?aggingwhichweaknessesareputtingyoumostatrisk,theonlywaytoimproveyoursecuritypostureistofollowthroughwithactionsthatclosethosesecuritygaps,suchaspatching,recon?guration,orimplementingnewpolicies.Penetrationtestingshouldnotbeseenasaboxtocheck,butratheramapthatneedstobefollowed.Equallyimportantisrepeatingpentestsaftertheremediationprocesstovalidatethat?xeswereproperlyimplemented.Lastly,whilethe15%dropinsecurityposturecon?dence(Figure3)mayappearconcerningat?rstglance,itisactuallybesttoerronthesideofcautionwhenitcomestocybersecurity.Overcon?denceoftentranslatesintostagnationandrigidity,feelingnoneedtoreevaluateF72023Penetration
TestingReportGeneral
Pen
Testing
ChallengesWhatchallenge(s)doesyourorganizationfacewithyourpenetrationtestingprogram?2022202358%45%38%36%35%31%29%30%12%10%TroublegettingexecutivesponsorshipandfundingfortheprogramInabilitytohireLackofquali?edthirdpartiestodothetestingLackofresourcestoacton?ndings/per-formremediationOtherenoughskilledpersonneltodothetesting(internal)Figure
3:PentestingchallengesF82023Penetration
TestingReportGeneral
Pen
Testing
ChallengesHowimportantispenetrationtestingtoyourorganization’ssecurityposture?20222023Howcon?dentareyouinyourorganization’ssecurityposture?2022202376%73%56%53%43%38%21%18%6%
6%6%4%NotimportantSomewhatimportantImportantCon?dentSomewhatcon?dentNotatallcon?dentFigure
4:ImportanceofpenetrationtestingFigure
5:Con?denceinsecuritypostureF92023Penetration
TestingReportCompliance
and
Pen
TestingRegulationslikeHIPAA,
PCIDSS,SOX,
GDPR,ortheCMMCmandateappropriate
protectionofhighlysensitive
data,
likecredit
cardnumbers,
socialsecuritynumbers,
andotherpersonallyidentifyinginformation.
Pen
tests
are
notonlya
way
to
evaluate
anorganization’ssecurity
posture,
buttheycanalsohelpverify
adherence
to
theseregulations,
proving
to
auditors
orotherauthoritiesthat
mandatedsecurity
measures
are
inplace
orworking
properly.complianceneeds,illustratingthein?uencecompliancecontinuestohaveonpentestingapproaches.Howimportantispenetrationtestingtoyourcomplianceinitiatives?20222023Thoughtherewasadeclinefromlastyear,
pentestingwasstillatleastsomewhatimportanttocomplianceinitiativesfor93%ofrespondents(Figure6).Interestingly,withanincreaseinthenumberofdataprotectionandsecuritylawsandregulations,pentestneedssurroundingcomplianceonlyseemtobegrowing.41%ofrespondentshaveincreasedthenumberofoverallpentestsinresponsetothesemandates(Figure7).71%62%Complianceinitiativesshownosignsofslowing,either.
TheEuropeanCommission
isrevisingtheGDPRin2023tostreamlinecross-borderinstancesofdataprotectionenforcement.Notonlyareexistingregulationsbeingcontinuallyupdatedtoincorporatenewmeasures,newlawsandregulationsarealsoemerging.For
example,in2022,nearly
every
US
state
putforthcybersecuritybills.Additionally,the2023
National
Cybersecurity
Strategy
includesaproposaltoexpandrequirementsforalloperatorsofcriticalinfrastructure.AccordingtoGartner,threequartersoftheworld’s
populationwillbeunderprivacyregulationsin2023.25%31%Whilesomehadtoincreasethenumberofpentestsinresponsetocomplianceinitiatives,othershadtoshifttheirstrategiesinsomeotherway,
whetheritwasexpandingthescopeoftheirtests(29%),addingmoreinternalsta?(23%),orplacingmoreemphasisoncertaintypesoftests,likewebapplication(35%)orsocialengineering(36%)(Figure7).Only16%ofrespondentsreportedthattherewasnoimpacttotheirpentestingstrategiesasaresultof7%4%ImportantSomewhatimportantNotimportantFigure
6:ImportanceofpenetrationtestingforcomplianceF102023Penetration
TestingReportCompliance
and
Pen
TestingHowhastheincreaseincomplianceregulation/mandatesa?ectedyourpentestingstrategyorpriorities?41%36%35%32%29%27%25%23%16%16%4%IncreasedquantityofpentestsoverallMoreemphasisonsocialMoreemphasisonwebMoreBroadenedAddedConductedAddedMoreemphasisonNoimpactOtheremphasisthescopeofadditional
morenarrowly
additionalonnetwork
ourpentests
third-partyscopedpen
internalsta?
IoT
Securityengineering/
application
securitytestsphishing
testspenteststestsTestsFigure
7:ImpactofcompliancemandatesonpentestingstrategiesF112023Penetration
TestingReportPhishingWiththeAnti-Phishing
Working
Groupobservingarecord1,270,883totalphishingattacksinQ3of2022alone,it’s
unsurprisingthatphishingisatopsecurityconcernofrespondents(70%)(Figure2).Howoftendoesyourorganizationconductphishingsimulations?20222023Sincephishingisoneoftheoldestattacktacticsaround,howhasitremainedsopervasive?Ultimately,it’s
thehumanelementofphishingthathaskeptitremarkablye?ective.Peoplereceivesomanymessagesandemailsthatit’s
easytobecomecareless,clickingonlinkswhileyourmindiselsewhere.Othersoverlyrelyonspam?lters,whichattackershavebecomeadeptatevading.Spearphishingtechniqueshavealsoimproved,witheverythingseeminglypersonalizedandappearingsoauthenticthatevenacybersecurityprocouldbefooled.23%Ongoing19%15%23%MonthlyQuarterlyAnnuallyNeverThoughphishingattackswillpersevere,oneofthebestdefensesistokeeppeopleontheirtoes.Runningregularphishingsimulationexercisescanhelpserveasaregularinitiativetokeepusersvigilantandtrainthemtoexercisemoreprecaution.24%25%Withthisinmind,itwasencouragingtoseean8%increaseinmonthlyphishingsimulations(Figure8),whichisagoodcadencetopromoteongoingawareness.Newandexistingregulationshavealsounderscoredthethreatphishingposes,with36%ofrespondentsnotingthatcomplianceinitiativeshaveplacedanincreasedemphasisonsocialengineeringtests(Figure7).
Thismayalsobere?ectedinthe16%increaseintheusageofthird-partytestingservicesforsocialengineeringtests(Figure19).20%17%18%16%Withgenerative
AI
makingsophisticatedphishingemailsandtextsthenorm,easywaystospotattackslikespellingandgrammarerrorsmaysoonbecomeathingofthepast.Instead,usersneedtoquestiontheintentoftheemailandwhethertherequestmakessense.Doyouoftenreceiveemailsfromthisperson?Isthishowanapplicationallowsasksyoutoauthenticateyourcredentials?Byrunningroutinephishingsimulationcampaignswithfollowupreportsandtrainings,organizationscanfosteracultureofhealthyskepticism.010
2030
40
50
60
7080
90
100Figure
8:FrequencyofphishingsimulationsF122023Penetration
TestingReportPenetration
Testing
FrequencyResultsforpentestingfrequencyhaveremainedconsistent.Asin2022,themajorityofrespondentsare,atmost,pentestingonlyafewtimesayear.
Whilerunningonetotwopentests(38%)isfarbetterthannothing(14%)(Figure9),itdoesraiseconcernsaboutretesting.Aninitialtestprovidesguidanceonremediation,butaretestiscriticalforensuringthesevulnerabilitieshavebeensuccessfullymitigated.Improperlyapplyingapatchmaynotjustleavethevulnerabilityintact,itcanalsoopennewsecuritygaps.Remediationvalidationshouldnotjustbeleftforthenextyear’s
roundoftesting.However,
whenresourcesarelimited,makingabusinesscaseforretestingmayprovedi?cult.
Thisalignswiththe?ndingofrespondentsencounteringchallengeswiththelackoffollowup(58%)frompentests(Figure3).Howoftendoesyourorganizationpentest?2022202313%Never14%10%DailyWeekly8%7%8%Runningtoofewtestsisn’t
ideal,butrunningdailyorevenweeklypentestsmaybeimpractical,sincetheydorequirethealreadyscarceresourcesoftime,budget,andtalent.Inordertorundailypentests,youwouldneedtohavealargepentestingteam.Eventhen,theywouldlikelyonlybeabletorunsmallerpentestsondi?erentpartsoftheinfrastructure—runningalargescopepentesteverysingledaywouldbeadi?cultchallenge.However,
though8%ofrespondentsreporteddailypentesting(Figure9),just50%ofthoserespondentshadinternalteamsofmorethan?veteammembers.For
theother50%,itmaybethattheyareinsteadreferringtothefrequencywithwhichvulnerabilityscansarebeingrun.
Vulnerabilitymanagementsolutionsaretypicallyhighlyautomatedandcaneasilybescheduledtorunonadailybasis,whilepentestingrequiresmoreadvanced11%12%17%20%MonthlyQuarterly42%38%planning.1-2timesayearThoserunningmonthly(12%)orevenquarterly(20%)tests(Figure9)aremorelikelytohaveachievedabalance,havingthemeansfortestingandretestingwithoutplacingastrainonresources.However,penetrationtestingfrequencyisaperfectexampleofwherebestpracticescollidewithrealworldpracticalities.Everysecurityteamwillhavetodeterminetheirneedswhilekeepingresourcesandbudgetsinmind.010
2030
40
50
60
7080
90
100Figure
9:FrequencyofpenetrationtestingF132023Penetration
TestingReportIn-House
Penetration
Testing
E?ortsHavingpentestingcapabilitiesin-housecanquicklyexpandpentestinge?orts,allowingformorefrequenttestsandcoverageofawiderscopeoftheITinfrastructure.It
alsoensuresthatchangestotheinfrastructurearemoree?cientlyassessedtoensurenewsecuritygapsaren’t
opened.
Thisyearshowsasmallamountgrowthofin-housepentestinge?orts,witha7%increasefromlastyearinthenumberofrespondentswhohaveaninternalpentestingteamattheirorganization(Figure10).Curiously,thesizeofpentestingteamsseemstobe?uctuating,withteamsbothgrowingandshrinking.
Whilethereisa21%increaseinthenumberofteamswith3-5members,thereisan11%decreaseinthenumberofteamswith1-2membersand10%decreaseinteamsof6ormore
(Figure11).Thedecreaseinlargerteamsmaybeillustrativeofthecybersecurityskillsgap,whichcontinuestopersist.Infact,accordingto(ISC)2’s2022
Cybersecurity
Workforce
Study,thecybersecurityworkforcegaphasgrownmorethantwiceasmuchastheworkforcewitha26.2%year-over-yearincrease.In
a?eldwithsomanyjobopenings,itwouldn’tbeuncommonfortheretobemoreturnoverandinstabilityinteamsize.Pen
testingtoolsmaybehelpingo?settheskillsgap,witha14%increaseinthenumberofrespondentswhocitedthatpentestingtechnologyhasatleastsomein?uenceonanorganization’sdecisiononhavinganin-houseteam(Figure14).Whiletherewasanincreaseinthenumberofrespondentswithin-housepentestingteams,therewerestillmorerespondentswhoeitherhadlosttheirin-houseteamorneverhadonetobeginwith.Reasonsforthelackofanin-houseteamvary,withtopreasonsbeinginsu?cientneed(48%),lackoftalent(36%),andlackoffunding(28%)(Figure13).Interestingly,thereisa12%decreaseinrespondentscitinginsu?cientneedforafull-timepentestingteam.Thismayre?ectagrowingacknowledgementoftheusefulnessofin-housepentestingteams,orevenpentestingingeneral.F142023Penetration
TestingReportIn-House
Penetration
Testing
E?ortsDoyouhaveanin-housepenetrationtestingteam?20222023Howmanydedicatedteammembersdoesyourin-housepenetrationtestingteamhave?2022202353%48%41%41%42%40%37%19%18%14%14%11%14%7%YesNo,butwehaveinthepastNo,we'veneverhadanin-housepenetrationtestingteam1-23-56-10Morethan11Figure
10:In-housepenetrationtestingFigure
11:In-housepentestingteamsizeF152023Penetration
TestingReportIn-House
Penetration
Testing
E?ortsWhatistheaveragenumberofyearsofexperienceyourin-houseteamhaswithpenetrationtesting?2022202356%34%32%24%22%19%3%10%1yearorless2-3years4-5years6ormoreyearsFigure
12:Yearsofexperienceofin-housepentestingteamF162023Penetration
TestingReportIn-House
Penetration
Testing
E?ortsWhydoesyourorganizationnothaveanin-housepenetrationtestingteam?2022202360%48%36%34%28%
28%30%19%22%19%4%8%LackoffundingNotenoughneedtoemployafull-timepentester/teamLackofexecutivesponsorshipLackoftalent/skillsetLeveragethirdpartiesexclusivelyOtherFigure
13:Reasonsfornothavinganin-housepentestingteamF172023Penetration
TestingReportIn-House
Penetration
Testing
E?ortsHowdoespenetrationtestingtechnologyin?uenceyourorganization’sdecisiontohaveornothaveanin-housepenetrationtestingfunction?2022202347%46%37%32%21%17%Strongin?uenceSomein?uenceNoin?uenceFigure
14:In?uenceofpentestingtechnologyF182023Penetration
TestingReportThird-Party
ServicesThird-partypentestingteamsremainapopularresource,with78%ofrespondentsleveragingthird-partyteamsinsomecapacity(Figure18).However,
therewasanoteworthyshiftindicatinganincreasedpreferenceforin-housetesting,witha16%dropinthosewhousedmostlyorexclusivelythird-partyservicesanda13%increaseinthosewhouseallormostlyin-housetesting(Figure18).
Thoughmanyassumeanin-houseteamismeantasareplacementforthird-partyservices,organizationsshouldideallyuseboth,soitwaspromisingtoseeevenamodest5%increaseinthosewhohaveanevensplitbetweenin-houseandthird-party.Lastly,thoughtheyareusedmostoftenfornetwork(81%)andapplication(65%)testing,itisworthpointingoutthatthird-partiesareutilizedby36%ofrespondentsforphysicalpentests(Figure19).Thesetestsinvolveattemptingtogainentrytoaphysicalfacility,system,ornetworkthroughtheexploitationofweaknesseslikedoors,locks,cameras,orotheraccesscontrols.Suchassessmentscanonlybecompletedbythird-parties,furtherhighlightingtheuniqueservicestheycanprovide.Whatmakesanevensplitideal?
Whileaninternalpentestingteamcanprovideregular,standardizedtesting,theyalsobecomequitefamiliarwiththeenvironmentthatthey’reassessing.
Thetopreasonthird-partyservicesaresolicitedisbecauseoftheirexternal,objectivepointofview(58%)(Figure15).Additionally,sincethird-partyteamsarefullyimmersedspecialiststhatcanstayuptodateonthelatesttrendsandtechniques,theyarealsofrequentlyutilizedtoapplydi?erentskillsets(50%).
Wantinganimpartialassessmentandadiversityofskillsmayalsobeareasonforwhy76%oforganizationstendtochangeservicesatleastevery2-3years(Figure17).Therewasa13%dropintheuseofthird-partyservicesforcompliance.Asmentionedearlier,complianceregulationsareexpandinginnumberandcomplexity,sothismaybemoreofare?ectionofteamsmanagingtheircomplianceneedsinternallyratherthanoutsourcing.Manyfalselyassumethatinordertomeetcomplianceneeds,third-partytestingisrequired.However,
thistypicallyisnotthecase.In
fact,PCIDSS,whichhassomeofthemostexplicitrequirementsforpentesting,doesnotstatethatathird-partytestisnecessary.Someorganizations?ndthird-partyservicesidealfordeterminingcomplianceneedsandobtainingstrategicsupportwithinitialtests.
Theythenusepentestingtoolstomaintaincompliance.F192023Penetration
TestingReportThird-Party
ServicesWhydoesyourorganizationutilizethird-partypenetrationtesters?2022202363%58%58%56%50%45%38%32%6%4%Togainanexternal,objectivepointofviewTomeetcompliancerequirementsToapplydi?erentskillsetstotheenvironmentNotenoughskilledpersonnelinternallytodothetestingOtherFigure
15:Reasonsforutilizingthird-partypentestingservicesF202023Penetration
TestingReportThird-Party
ServicesHowoftendoyouconductthird-partypenetrationtests?2022202355%54%22%19%7%7%8%12%12%
5%3%4%OngoingMonthlyQuarterlyAnnuallyEvery2-3yearsEvery3+yearsFigure
16:Frequencyofthird-partypentestsF212023Penetration
TestingReportThird-Party
ServicesHowoftendoyouchangewhichthird-partypentestingserviceyouworkwith?2022202341%24%20%23%18%14%14%12%Never,weusethesameoneeverytimeEvery2-3yearsAnnuallyEverypentestweconductFigure
17:Rotationfrequencyofthird-partypentestingservicesF222023Penetration
TestingReportThird-Party
ServicesWhatisthecurrentsplitbetweenusinginternalandthird-partypentestingresources?2022202327%24%22%23%20%18%17%18%17%14%AllinternalMostlyinternalEvenlysplitMostlythird-partyAllthird-partyFigure
18:Splitbetweeninternalandthird-partypentestingservicesF232023Penetration
TestingReportThird-Party
ServicesWhchtypesofpenetrationtestsdoyouutilizethird-partytestersfor?2022202381%
81%68%65%48%46%44%36%33%30%23%22%4%3%NetworktestingApplicationtestingSocialengineeringCloudsecurityPhysicalpenetrationtestingIoTsecuritytestingOtherFigure
19:Typesofpenteststhird-partytestersarerequestedtoperformF242023Penetration
TestingReportOther
SecurityAssessment
ServicesDoyouuseanyoftheseothersecurityassessmentservices?Justasorganizationsmayhavecomplementarysolutionsintheiro?ensivesecuritytoolkit,th
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 教師薪酬保密協(xié)議書
- 柜子浸水保修協(xié)議書
- 智障兒童安全協(xié)議書
- 明清服飾租售協(xié)議書
- 樓梯樣品購買協(xié)議書
- 格力授權(quán)簽約協(xié)議書
- 施工損壞電纜協(xié)議書
- 擅自破壞林地協(xié)議書
- 濾芯機(jī)器轉(zhuǎn)讓協(xié)議書
- 油缸滑塊訂購協(xié)議書
- 籃球比賽計(jì)分表word版
- 封樣管理規(guī)定
- 上古卷軸5所有任務(wù)代碼
- 固體制劑批包裝記錄模版
- 2000年40個(gè)部門投入產(chǎn)出表
- 高空作業(yè)安全會(huì)議記錄內(nèi)容
- 00510秘書實(shí)務(wù)-自考整合版
- 護(hù)理研究中的偏倚及控制
- 小學(xué)生的齲齒預(yù)防ppt課件
- [復(fù)習(xí)]邊坡客土吹附施工方案
- 沖壓試題庫及答案文檔
評(píng)論
0/150
提交評(píng)論