Evolution of Cybersecurity Testing

Lumu's tip on continuous compromise assessment

Blog Evolution of Cybersecurity Testing

| 3 min read

Contact us

The activity of cybersecurity testing at present, according to the information given to us by Sylvester and Cuervo, can prompt us to remember its beginnings. Among them, for example, is the procedure carried out by the U.S. Navy in the eighties. On that occasion, it was a pentesting procedure intended to reveal how simple it might be to breach on one of its own bases. This type of process, framed in the ethical hacking activity, has achieved remarkable improvements. It can be considered a 'traditional' security testing together with the vulnerability assessment process. This testing continues to be enormously important in a variety of industries and organizations within our current society.

Nevertheless, according to the authors, something is happening with this traditional procedure. It seems that the breaches in companies continue to grow exponentially and are accumulating. This happens despite the effort that is being made in their security with the tools and programs available. Many of the companies have taken months or even years to detect those 'compromises' or risks. The problem seems to stem from handling the same processes. Those that years ago, and today are often seen as sufficient in cybersecurity assessment. It is required then, as suggested, an evolution in cybersecurity testing.

Citrix, for example, is one of those companies. Possibly by doing two cybersecurity tests a year (for 10 years), with the traditional vulnerability scanning, they had not realized that the adversaries were already inside their network. They had not noticed that their security had been breached. Traditional tests are leaving aside the fact that networks may already have been compromised.

The requested evolution in cybersecurity, following the reports of the authors, can take as examples the advances in some methodologies. Specifically those in the medical and aviation industries. They have really sought to learn from their mistakes. Both industries have followed a long process of improvement. This has been done through detailed research, with the aim of immediate remediation of any inconvenience. These industries have tried to be open communities and to share information between entities, in addition to establishing standardized processes. Their testing exercises continually aim for an approach to 'perfection.' At least assuming the alteration of some controllable variables. And hoping that some methods result even more predictable and successful, always to the benefit of the user.

Get started with Fluid Attacks' Security Testing solution right now

Therefore, it is established that we cannot conclude that a network is secure only with pentesting and vulnerability scanning. These processes focus on testing risks outside the corporate network. And they are established as preventive techniques and assessment of defenses. Accordingly, they deliver information on potential attacks. They don't do it on confirmed attacks. They may constitute a work with a limited vision, starting from a 'false hypothesis,' taking that the attacker is outside. It's not being considered that the attacker may already be inside. In the latter, prevention may no longer be useful.

Cuervo talks about a typical "misconception that all attacks occur on servers and databases." When in fact most attacks start with emails addressed to an organization's employees, from malicious subjects (recall our ransomware blog post). This is intended to affect certain devices initially, and then "move laterally until higher value assets are found."

lumu

Image taken from Sylvester's presentation.

These experts then propose as indispensable the analysis of network metadata for the location of compromises. Next, to compare with traditional tests and verify if there is additional information. Afterwards, the possible contribution of the findings to the organization's posture on risk must be analyzed. Finally, a continuous repetition of compromise assessments is suggested.

Such assessments are expected to provide ongoing insights. All of them about the timing, locations, and communication procedures of the infrastructure with adversaries and potential attackers. We cannot forget that an organization's metadata generation can be enormous. But being aware of the DNS queries, for example, can be a significant advantage in knowing whether the organization's network has already been compromised. The same goes for firewalls and proxy data. Being attentive to this type of data, and analyzing it, can allow the monitoring of the activity of adversaries already present within the network. It is then established as fundamental to carry out measurements and then manage the findings.

The development of fairly advanced cybersecurity testing is of vital importance. Especially for the sustainability of multiple organizations in this highly-connected world. Based on what we have learned from the aforementioned authors: it is advisable to maintain the position that within our organization's network there may already be adversaries. From this, and beyond a traditional vulnerability scanning, we can move on to analyze network metadata. We can complement traditional methods with an evaluation of compromises. We can work incessantly, with real-time data, on proving that our system really is free of all adversaries and possible attackers. And if necessary, we can work on the elimination of those compromises or present risks and thus improve the security of our systems. These are recommendations that we should not simply ignore.

"It is not the strongest of the species that survives, nor the most intelligent that survives. It is the one that is most adaptable to change." (Quote mistakenly attributed to Charles Darwin.)

Any questions about what Fluid Attacks can do for you as part of the cybersecurity process in your organization? Contact us.

Share

Subscribe to our blog

Sign up for Fluid Attacks' weekly newsletter.

Recommended blog posts

You might be interested in the following related posts.

Photo by James Lee on Unsplash

A lesson of this global IT crash is to shift left

Photo by CardMapr on Unsplash

Users put their trust in you; they must be protected

Photo by Wilhelm Gunkel on Unsplash

Transparency for fewer supply chain attacks

Photo by Sarah Kilian on Unsplash

Develop bank applications that resist DDoS attacks

Photo by Towfiqu barbhuiya on Unsplash

Ensuring compliance and security in the banking sector

Photo by Andre Taissin on Unsplash

With great convenience comes increased risk

Photo by FlyD on Unsplash

Software supply chain management in financial services

Start your 21-day free trial

Discover the benefits of our Continuous Hacking solution, which hundreds of organizations are already enjoying.

Start your 21-day free trial
Fluid Logo Footer

Hacking software for over 20 years

Fluid Attacks tests applications and other systems, covering all software development stages. Our team assists clients in quickly identifying and managing vulnerabilities to reduce the risk of incidents and deploy secure technology.

Copyright © 0 Fluid Attacks. We hack your software. All rights reserved.