control, and governance
Why Good Security Testing Tools Matter
The right security testing tool can mean the difference between identifying security vulnerabilities before they become a problem or simply discovering problems after they occur.
Kevin Beaver, CISSP
Principle Logic LLC
When it comes to identifying vulnerabilities and minimizing security risks, traditional techniques such as security audits may not be up to the task. Malicious outsiders and rogue employees don't stop at, "Yes, laptop encryption is in place," "Yes, strong passwords are being used," or "Yes, a no wireless policy exists." These individuals are looking beyond these basic controls, which are often not implemented correctly. They also know that policies are minimally enforced at best in many organizations. As a result, internal auditors need to extend their testing several steps further to validate that problems exist and determine how these vulnerabilities can be exploited. This means auditors must take the lead and work like hackers and rogue employees do, think like they do, and — most important — use good tools like they do.
THE RIGHT SECURITY TESTING TOOL
Like chemists, carpenters, and doctors, internal auditors need to use the right tool for the right job if they are going to stay ahead of the curve. This is because the tools of a professional are often different from those of a novice. For instance, the tools used by a biochemist are far more precise than those used by a middle school student taking a chemistry course. The same is true for professional internal auditors focused on IT security: Knowing the right tool for the job and how to use it can distinguish a professional auditor from someone who is dabbling in IT security. In fact, the quality of the tools used for performing security assessments will directly impact the number of vulnerabilities discovered and the overall success of the testing activity. However, auditors should not rely on tools alone to detect all security vulnerabilities to corporate assets. Auditors need to rely on experience and technical knowledge to root out the less-than-obvious vulnerabilities.
Selecting the wrong tool also can be an expensive venture. The same is true of freeware and open source tools. Although auditors and organizations may not lose money directly, the time lost in trying to get software installed and then generating an end report can be substantial. Furthermore, auditors need to consider how the test will be conducted. Often, manual testing alone is too time consuming, limited, and difficult. The same goes for finding tools that operate based on the testing style and abilities of the company's IT network. The good news is that many of the newer security tools — even the free or inexpensive ones — are full of value. Auditors simply have to know what to look for and how to find them.
TOOLS YOU'LL NEED
The uniqueness of IT environments from organization to organization makes a "one-size-fits-all" approach to security impossible. Consequently, because every network and business environment is different, it might be difficult to recommend specific security testing tools. However, many software programs are classified based on a number of widely recognized ethical hacking methodologies, including:
An important point to keep in mind is that during each of the ethical hacking phases (i.e., reconnaissance, enumeration, vulnerability scanning, and exploitation), general tools that can support any live system with an Internet protocol (IP) address are sufficient. However, auditors also may need technology-specific tools to find issues in niche and newer technologies. Specific tools needed include those for wireless networks, Web applications, databases, storage systems, Voice over IP, and software source code. The goal is for auditors to use these tools with a malicious mindset when looking for security vulnerabilities that originate outside or inside the company's IT network.
TRAITS OF GOOD SECURITY TOOLS
Traits of a Good Security Tool
When selecting a security testing tool or recommending the purchase of one, internal auditors should pay attention to the following traits:
Another attribute to look for in a security tool is its broad reporting features. In today's world of big governance, auditors have to keep solid records to properly document their work. In the context of security assessments, this means having documentation to back up an action. By and large, most tools have at least some form of rudimentary reporting feature. Hence, auditors should look for tools that have pre-canned report templates for colorful executive summaries and that include the technical details needed for remediation reports. These templates will help to take the pain out of the testing process — especially toward the end of the project when it takes time to generate detailed reports. It's important to point out that not all tools will have reporting features. In this case, a screen shot of the findings may be enough.
Finally, when evaluating commercial tools, as well as freeware and open source applications to an extent, auditors need to make sure the tool's developer or vendor is easy to work with. Companies and auditors should not invest time and money on a tool that doesn't have a reasonable level of support or good customer service.
WHEN ALL IS SAID AND DONE
Whether auditors are doing the actual work or want to make sure their IT and security staff are using what's best for the organization, good security testing tools do make a difference. Remember: There is no single best tool — auditors might need to use a combination of freeware, open source, and commercial products. Either way, the auditor and the organization may have to spend some money to be able to perform the audit as effectively as possible.
Furthermore, when auditors spend a relatively small amount of time conducting research — that is, asking tool vendors questions to make sure their solution is a good fit or trying the tools before buying them — they will be able to obtain the information needed to select the tool that best meets the organization's audit needs. In addition, when a good tool is selected, the auditor will know it — amazingly, he or she will be able to minimize the time and effort needed to install the tool, run tests, and report results. Most important, auditors will be able to maximize the number of vulnerabilities discovered to help reduce the risks associated with their organization's information systems. In the long run, the time spent researching a good security testing tool will add up to considerable business value that an auditor or organization can't afford to overlook.
Kevin Beaver, CISSP, is an independent information security consultant, speaker, and expert witness with Atlanta-based Principle Logic LLC. He has nearly two decades of experience in IT and specializes in performing information security assessments on compliance and risk management. Beaver has authored and co-authored seven books on information security, including Hacking for Dummies, Hacking Wireless Networks for Dummies, and The Practical Guide to HIPAA Privacy and Security Compliance. He's also the creator of the Security on Wheels information security audio books.
COMMENT ON THIS ARTICLE
Internal Auditor is pleased to provide you an opportunity to share your thoughts about the articles posted on this site. Some comments may be reprinted elsewhere, online, or offline. We encourage lively, open discussion and only ask that you refrain from personal comments and remarks that are off topic. Internal Auditor reserves the right to edit/remove comments.