eBooks/eGuides

eBook_Protecting Your Org with Strong Security Controls

Issue link: https://insights.oneneck.com/i/1199907

Contents of this Issue

Navigation

Page 16 of 17

oneneck.com/it-security-services 17 Sec on Four Control 18 – Penetration Testing A good defense includes a good offense. Because technology and attack patterns change constantly, it makes sense to periodically test your own systems and proactively address flaws. You can hire a company to perform this service if you don't have these capabilities. This control will help you test your company's defenses by emulating would-be attackers who include malicious insiders, cybercriminals, hacktivists and nation states. By considering their motives, objectives and actions, you can identify and correct any vulnerabilities they would exploit. This control targets IG2s, who should create a penetration test program; conduct regular internal and external tests to identify vulnerabilities, attack vectors, and unprotected information and artifacts; conduct exercises to attack elements not typically tested in production; use vulnerability scanning to help guide penetration testing; and control and monitor all accounts that are used for penetration testing. Test findings can then be remediated based on your company's policies for remediation, scope, and prioritization. Case Study Placeholder of organizations say they have only temporary resources, or none at all, to respond to security incidents. (Jaikumar Vijayan) 22%

Articles in this issue

Links on this page

Archives of this issue

view archives of eBooks/eGuides - eBook_Protecting Your Org with Strong Security Controls