Talk With an Expert

In but not Out: Protecting Confidentiality during Penetration Testing

In but not Out: Protecting Confidentiality during Penetration Testing (PDF, 9.45MB)Published: 22 Aug, 2016
Created by:
Andrew Andrasik

Penetration testing is imperative for organizations committed to security. However, independent penetration testers are rarely greeted with open arms when initiating an assessment. As firms implement the Critical Security Controls or the Risk Management Framework, independent penetration testing will likely become standard practice as opposed to supplemental exercises. Ethical hacking is a common tactic to view a company's network from an attacker's perspective, but inviting external personnel into a network may increase risk. Penetration testers strive to gain superuser privileges wherever possible and utilize thousands of open-source tools and scripts, many of which do not originate from validated sources.