Cybersecurity is full of thorny questions.
Last week one arose in a discussion around cyberinsurance.
Last week I was helping prepare a cyber insurance questionnaire, and a thorny question arose - What's the difference between a vulnerability scan and a penetration test?
The cyber insurer asked for the results of a penetration test as a baseline evaluation of a company's security posture. At first glance, this seems like a reasonable request - but there's some context to consider...
Running a penetration test as a first evaluation is like asking a 16-year-old to complete a university entrance exam - and then reporting back all the topics they don't know.
Is it surprising that there are gaps in knowledge - before - two years of focused study? Personally - I think not.
The question we pose at Fresh Security is - How do our customers discover areas of weakness in the most cost-efficient way possible? The answer isn't a penetration test.
In the past, when I ran IT infrastructures, the quotes I received for a penetration test were typically around £10,000. More recently, I was quoted that - per day. This, of course, varies based on the scope and complexity of the task, but needless to say - penetration tests aren't cheap.
If you're looking for a list of areas of security weakness - like most need at the start of a new cybersecurity program - a vulnerability can provide a solid baseline at a 10x to 30x lower cost.
And so...
Vulnerability scans and penetration tests (or pen tests) are both valuable ways to find gaps in your security. At a high level, vulnerability scans probe systems and networks using standard protocols to gather responses. This response may include details about the version of an operating system or application that is running.
From there, the data is used to query an extensive database of known weaknesses and vulnerabilities to match potential issues and concerns. As the process is relatively simple - once designed - vulnerability scanners can be automated and cost-effective.
In contrast, penetration tests involve skilled experts or "ethical hackers" who exploit weak spots to test your overall security. The first step is likely the same - discovering what systems and networks are within scope. And much like the initial vulnerability scan - known weaknesses and exploits are reported.
Where penetration tests differ - is that they go further. Penetration tests simulate actual attacks and may exploit weaknesses in processes and your team's behaviour.
The timing of vulnerability scans and pen tests depends on the maturity of your cybersecurity program:
However, you'll need an active cybersecurity program if you're working in a high-risk industry - such as banking or finance. This program will include ongoing vulnerability scans and frequent pen tests, aiming to mimic actual attacks, spot new threats, and continually improve security.
Value for money and return on spend are often overlooked when it comes to cybersecurity tools and processes.
Without a doubt, penetration tests find more nuanced vulnerabilities and offer greater assurance than vulnerability scans. This is ideal for mature cybersecurity programs. But in your early journey, the question must be - at what cost?
In contrast, vulnerability scans provide a cost-efficient starting point - and continue to be vital in a maturing program. They can only test some aspects of security programs. But, they offer an excellent overview and prioritisation method early in your cybersecurity journey.