Pen Testing as a Service (PTaaS) is a cloud service that
provides information technology (IT) professionals with the resources they need
to conduct and act upon point-in-time and continuous penetration tests. The
goal of PTaaS is to help organizations build successful vulnerability
management programs that can find, prioritize and remediate security threats
quickly and efficiently.
In IT security, it is common practice for businesses to
hire reputable, white hat testers to come in and proactively look for attack
vectors that could be exploited. Inviting an outside entity to try and breach a
network, server or application may sound counter-intuitive, but it’s also one
of the best ways to identify and remediate difficult-to-spot security issues.
How PTaaS works
In the old days, before cloud computing, pen test results
were delivered after the conclusion of the testing period. While the
information was helpful, the historical nature of the data often made it
difficult for in-house security teams to prioritize and fix test results.
Automated pen tests conducted through a software as a
service (SaaS) delivery model can fix this problem by allowing customers to
view their data in real time in an executive dashboard that displays all
relevant data before, during and after the test is performed. Just like
traditional pen testing services, PTaaS vendors also provide their customers
with resources for parsing vulnerabilities and verifying the effectiveness of a
remediation. Typically, PTaaS vendors provide their customers with a knowledge
base to assist in-house security teams with remediations, and as an added
value, some vendors provide optional assistance from the actual testers who
discovered a vulnerability.
PTaaS is well-suited for organizations of any size. Most
platforms are very flexible and can accommodate everything from a full testing
program to custom reporting features for customers whose regulatory
requirements pose heavy compliance burdens.
Pen Testing as a Service should not be confused with cloud
pen testing. PTaaS is a delivery platform, while cloud pen testing seeks to
identify security gaps in a specific cloud infrastructure.
Benefits of Pen Testing as a Service
One of the biggest benefits of PTaaS is the control it
gives the customer. Companies with less experience in the security industry
gain a partner and a platform that provides them everything they need to build
a successful threat and vulnerability management program.
In addition to presenting the progress and status of all
open engagements, PTaaS cloud platforms make it easy for customers to request
and scope new engagements. Other benefits include:
Flexible purchasing options: Automated, manual and hybrid pen test services can be
budgeted for and procured through a monthly, quarter or yearly subscription or
on an as-needed basis.
Continued access to real-time data: As an existing vulnerability or exploit evolves over
time, the data related to it is updated.
Flexible reporting options: Many PTaaS platforms can aggregate and correlate
findings from multiple sources and provide result sets that meet the needs of
multiple stakeholders.
Automation:
Automated workflows make vulnerability scanning for external network and
unauthenticated web applications easier to conduct
Challenges of using PTaaS
When vulnerability orchestration is automated, customers
can manage budget and internal resources more efficiently, which in turn,
allows them to run more tests. Some companies are not in a place where they can
manage additional testing cycles, however.
Newer and underfunded security programs sometimes
struggle to remediate the vulnerabilities discovered during annual penetration
testing, let alone weekly, monthly, or quarterly testing. Because security
budgets are finite in many organizations, it may be hard to justify the
additional costs for extra tests and remediation efforts.
What to look for in a PTaaS supplier
There are a few core elements potential customers should
look at when evaluating automated, manual or hybrid penetration testing
services, including the reputation and history of the vendor.
In addition to providing a robust library for remediation
instructions, other notable product features include:
- The ability to aggregate and correlate data from multiple sources.
- The ability for multiple testers to work simultaneously on the same project and combine findings in a single workspace for reporting.
- The ability to normalize confidence and severity across scanners to improve hits and reduce false positives.
- The ability to generate reports in multiple file formats.
- The ability to customize report templates for specific types of tests.
- The ability to track trends over time and monitor remediation completion time.
- The ability to integrate reporting with enterprise ticketing and governance, risk and compliance (GRC) systems.
Comments
Post a Comment