Need a Penetration Test? Here’s What to Do Next
In our experience as cybersecurity experts and highly qualified penetration testers, there are typically three reasons why you may move forward with a penetration test and start looking around for a provider. Making that initial decision to move forward with an assessment like this is a big step, but what should you do after you make it?
If you fall into any of the following common scenarios that mandate a pen test, here are the immediate next steps to take for each one:
- You want to proactively improve your cybersecurity
- You need to satisfy a client request
- You need to meet compliance requirements
1. What to Do Next When You Need a Penetration Test for Improved Cybersecurity Purposes
If you’re already performing external network, authenticated web application, and authenticated internal network vulnerability scans, a penetration test can be a great and natural next step in building a more mature security posture for your organization.
Once you decide to take this step, you then need to decide the scope—or, what you want to test. To help you understand more specifically what you need, check out our page describing our broad suite of Penetration Test services.
As each of the different pages contains more details and FAQs about each different type of pen test, you’ll be able to zone in more on what suits your needs—which may be more than one type of test. Knowing what kind of test(s) you need should then help streamline your subsequent search for vendors.
Do keep in mind though, that a solitary penetration test likely won’t suffice as your organization and products evolve—while your cadence can vary, you should expect to repeat this process more than once to achieve optimal cybersecurity.
2. What to Do Next If Your Client Requested You Perform a Pen Test
Of course, if you’re pursuing a pen test due to a client request, they likely already know exactly what kind of test they want—and if not, you shouldn’t move forward with a vendor until you do understand the specific nature of your client’s request.
You need to know what part of your environment your client wants examined, as there are many different attack vectors you can have tested:
- Web Application
- Application Program Interface (API)
- External Network
- Internal Network
- Social Engineering (Phishing/Vishing/Smishing)
- Mobile Application
Once you know what they want, you can then use our scoping questionnaire to drill down even more specifically to better determine the level of effort and resources that this engagement will take (and search for vendors that can perform what you need).
3. What to Do Next If You Have a Compliance Requirement for a Pen Test to Be Performed
In a similar vein, you may be in the market for a penetration test because a compliance standard you’re being asked to adhere to calls for one. If that’s the case, the good news is that most compliance frameworks have strict requirements as to what should be included in the scope of its requisite penetration test, with the two major being:
Your next step, then, is to familiarize yourself with those strict requirements of the particular standard you’re seeking to comply with so that, when you do engage a penetration tester to perform the work, you can work more closely and knowledgeably with them to ensure you’re meeting all the requirements necessary to achieve your compliance initiatives.
Other Important Penetration Test Considerations
No matter what scenario you fall under, you’ll need to accommodate your penetration test within your daily operations, which means understanding—at least roughly—how long your tailored assessment will take, and several factors can affect the duration of your penetration test.
Similarly critical will be the overall scheduling and timing for your penetration test, which is more complex than you may anticipate—together with the anticipated duration, it’ll be important to understand what constraints you have, be they compliance requirements or otherwise, so that you ensure you leave yourself plenty of time to accommodate the test, including any time that may be necessary for retesting.
And finally, you’ll also need to set aside funds for a penetration test. Just as with timing and duration, your price will depend on various factors, and this article breaks down the different considerations for different types of penetration tests so that you can more easily gauge your possible costs.
—-
Having a penetration test performed is a solid step, whether it moves you closer to bolstering your cybersecurity, satisfying client requests, or meeting compliance requirements. Now that you have your next steps, as well as further details on common considerations, you can more easily set expectations for your organization going forward.
Once you’ve zeroed in on what you need, you’ll be in the market for a vendor and Schellman might be a great fit. For a specific conversation regarding how we can meet your needs, contact us today, but in the meantime, check out these two articles that can provide insight into our team and process:
About Josh Tomkiel
Josh Tomkiel is a Managing Director on Schellman’s Penetration Testing Team based in the Greater Philadelphia area with over a decade of experience within the Information Security field. He has a deep background in all facets of penetration testing and works closely with all of Schellman's service lines to ensure that any penetration testing requirements are met. Having been a penetration tester himself, he knows what it takes to have a successful assessment. Additionally, Josh understands the importance of a positive client experience and takes great care to ensure that expectations are not only met but exceeded.