<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Explore Security &#187; defence in depth</title>
	<atom:link href="https://www.exploresecurity.com/tag/defence-in-depth/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.exploresecurity.com</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Wed, 15 Jun 2022 09:21:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
		<item>
		<title>Defence In Depth Penetration Testing</title>
		<link>https://www.exploresecurity.com/defence-in-depth-penetration-testing/</link>
		<comments>https://www.exploresecurity.com/defence-in-depth-penetration-testing/#comments</comments>
		<pubDate>Wed, 14 Aug 2013 22:53:15 +0000</pubDate>
		<dc:creator>Jerome</dc:creator>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[defence in depth]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[pentesting]]></category>

		<guid isPermaLink="false">http://www.exploresecurity.com/?p=95</guid>
		<description><![CDATA[Never before has it been more important to think the unthinkable: what if an attack succeeds? (If you need some stats and arguments to persuade the Board of this, try this article of mine, of which this is a summary.) The solution to mitigate the threat of a successful attack is already very familiar to us all: defence [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Never before has it been more important to think the unthinkable: what if an attack succeeds? (If you need some stats and arguments to persuade the Board of this, try this <a href="http://penetration-testing.7safe.com/thinking-the-unthinkable-what-if-a-cyber-attack-succeeds/">article</a> of mine, of which this is a summary.) The solution to mitigate the threat of a successful attack is already very familiar to us all: defence in depth. But to what extent are those <em>inner</em> defences tested? What about a “second-level” penetration test, which would start from the assumption that a first-level defence has been bypassed?<span id="more-95"></span></p>
<p>Beyond a few run-of-the-mill scenarios, this type of penetration test is not widely considered &#8211; at least not that I&#8217;ve seen in the UK. First, let’s be honest, the reality is that such testing is often not required to tick the boxes necessary to achieve the minimum level of legal and regulatory compliance. Second, penetration tests are traditionally categorised by the amount of knowledge the tester has of the target system &#8211; for example, “white box” versus “black box”. (The <a href="http://www.isecom.org/research/osstmm.html">OSSTMM</a> also considers the level of knowledge the target has about the test.) Then we have the generic &#8220;external&#8221; versus &#8220;internal&#8221; test, which both carry assumptions about the initial level of access. For the external test, it&#8217;s usually zero or credentials have been supplied or an IP address has been white-listed. For the internal test, it&#8217;s implicit that the tester has physical (or virtual) access to the system (and possibly credentials to go with it).</p>
<p>There’s no reason, however, why a pen-test could not start from a more adventurous position of access. Consider, for example, the scenario of a compromised web server on which a web shell has been dropped &#8211; or indeed a <a title="Sophie – a web SQL shell" href="http://www.exploresecurity.com/sophie-a-web-sql-shell/">SQL shell</a>! A second-level penetration test could start with this in place for the tester to see what access could be achieved should such an initial attack ever succeed. This would obviously require careful configuration so that the web shell would only be accessible to the tester but this could be done quite simply.</p>
<p>So let&#8217;s make the level of initial access more of a variable in pen-tests and get creative. Think about various attack scenarios and what, if anything, is in place to thwart them should the first line of defence be breached. These can form the basis of scopes for further penetration tests and will really help an organisation to move forward with its security &#8211; in particular, preparing for and reacting to successful attacks.</p>
<p>Do add a comment if you&#8217;re in a company that has done this (well done you) or perhaps you&#8217;re a pen-tester that&#8217;s performed such a test (interested to know the scenario).</p>
]]></content:encoded>
			<wfw:commentRss>https://www.exploresecurity.com/defence-in-depth-penetration-testing/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
