Pentest Best Practices Checklist PDF
Pentest Best Practices Checklist PDF
Pentest Best Practices Checklist PDF
Checklist
INTRODUCTION
Damn, but security is hard.
It’s not always obvious what needs doing, and the payoffs of good security are at best
obscure. Who is surprised when it falls off our priority lists?
Running a first (or even your 100th) Pentest can be a daunting experience, but it
shouldn’t feel like a chore. We’d like to offer a little help if you don’t mind. And by « help »
we don’t mean « pitch you our product »—we genuinely mean it.
Sqreen’s mission is to empower engineers to build secure web applications. We’ve put our
security knowledge to work in compiling an actionable list of best practices to help you
get a grip on your penetration tests. It’s all on the following pages.
We hope your find if useful. If you do, share it with your network. And if you don’t, please
take to Twitter to complain loudly—it’s the best way to get our attention.
1
SCOPE
2
Assess the risks before a pentest - http://bit.ly/2DG7tAt
Performing a security risk assessment - http://bit.ly/2Thk2qv
✔ Determine a budget
There’s the $50 “script-kiddie” on Fiverr and there’s the hundred thousand dollars
pentest. Your budget is an important discriminating factor and it has to be aligned with
your objectives and the value of your assets. Eventually, you end up getting what you paid
for (in most cases…). If you are looking to find critical vulnerabilities in a very complex
architecture or if you are interested in reassuring your customers with a big brand by
putting a seal of approval on your security practices; you will need to pay the price.
3
✔ Launch scanners before
Pentests will reveal the ugly truth about your systems or your applications. However, if
you already know some of your vulnerabilities and basic issues, take the time to run
scanners and fix the issues instead of wasting valuable pentesting time and energy
uncovering what you already know or could know with other automated tools.
4
EXPERTISE
✔ The more trustworthy the company, the more trustful your clients
are gonna be
Pentests are tools to uncover vulnerabilities but they are also reassuring your clients. So if
you are going the extra length as to hire a pentester, you might as well get a good one.
Remember that you will mostly get what you paid for. If you hire cheap, you will most
probably get sloppy work. Check the pentesters credentials and talk to previous clients if
possible.
5
Penetration testing guidance from Payment Card Industry Data Security Standard -
http://bit.ly/2Q4Qhue
Best practices for pen testing mobile apps - http://bit.ly/2zb3EQ9
6
MONITORING
7
✔ Monitor your security monitoring tool
Your security monitoring tools should pick up the activity from the pentests. However,
you might have real attacks occurring at the same time. Make sure your team is up to
date on the performed pentests to be able to distinguish the attacks.
Sqreen - http://bit.ly/2MDSMTm
8
REMEDIATION
9
✔ Prioritize the report findings
The auditors will sort the vulnerabilities given their technical criticity. Review this
prioritization to ensure it is also compatible with the business direct or indirect impacts.
You can use Sqreen to easily differentiate between real vulnerabilities and false positives.
✔ Make sure you got alerted about the critical attacks during the
pentest.
Scan the report to make sure you were informed about all the critical attacks performed
during the tests and what their impacts were. These attacks might have uncovered critical
vulnerabilities, but could also have impacted your system and modified or deleted your
data.
10
COMMUNICATION
11
How CISO should address their boards about security - http://bit.ly/2K6oJiX
Getting CISO and CEO to talk same language - http://bit.ly/2PYLY3z
How to talk 'security' to the board (YouTube) - http://bit.ly/2Q2j0jr
12
LESSONS LEARNED
13
✔ Evaluate penetration testing effectiveness
Have the pentests achieved the goals you set? What could have been done differently/
better? The frustrating part about penetration tests is that when they find vulnerabilities,
it is bad news, but the absence of discoveries does not mean absence of vulnerability. Do
not judge the pentest by how little or how many vulnerabilities were uncovered.
14
Protect your customers’
sensitive data.
Sqreen provides visibility and protection over most
threats targeting applications with no overhead on
engineering teams.