




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
2023
PenetrationTesting
Report2023Penetration
TestingReportIntroductionSincepenetrationtestingencompassesagreatvarietyofsecurityassessments,tools,andservices,thereisnosetformulaforthecreationandmaintenanceofapentestingstrategy.For
thosewantingtosuccessfullyincorporatepentestingintotheirowncybersecurityprogram,thiscanpresentachallenge,withnoclearplacetolooktoasaguidingexample.••••In-housepentestingteameffortsandchallengesUsingandselectingthird-partyteamsEvaluatingpentestingtoolsetsIntegratingpentestingwithothersecurityassessmenttoolsWe’ll
showacomparisontotheresultsofthe2022surveyanduncovernewinsights,analyzingthegeneralevolutionandadvancementofthepenetrationtestingfield.In
general,cybersecurityhasbecometiedtoanorganization’sreputation,withabreachhavingthepotentialtoseverelydamagetheirstanding.Unfortunately,thiscancreateanenvironmentinwhicheveryoneisreticenttoshareanyaspectoftheirsecurityjourney.However,
knowledgesharingandanalysisisacriticalpartofdefiningbestpracticesandpresentingaunitedfrontagainstthreatactors.
Withoveradecadeofspecializedexperience,Fortra’sCoreSecuritydevelopedapenetrationtestingsurveyinordertogetabetterpictureofhowcybersecurityprofessionalsareusingpenetrationtestinginthefield,includingpentestingstrategiesandtheresourcesrequiredtodeployasuccessfulpentestingprogram.Nowinitsfourthyear,
thissurveycontinuestotrackyear-over-yearchanges,trends,challenges,andareasofimprovement.
Thedatacollectedprovidesvisibilityintothefullspectrumofpentesting’srole,helpingtodeterminehowtheseservices,tools,andskillsmustevolve.
Thisyear,
we
continuetoseeslightshiftsintherolepenetrationtestingplaysinthecybersecuritylandscapeandidentifyhowbroadertrends,liketheglobaleconomy,caninfluenceitsrole.Theresultsareexploredindetailinthisreport,providingvaluabledataonthefollowingkeyissuesrelatedtopentesting:•Top
securityconcernslikeransomware,phishing,andmisconfigurations•••Testing
frequencyandremediationComplianceconcernsPen
testingindifferentenvironmentsF22023Penetration
TestingReportReasons
for
Pen
TestingOrganizationspentestformultiplereasons,with69%reportingtheyperformpentestsforriskassessmentandremediationprioritization,62%forvulnerabilitymanagementprogramsupport,58%forcomplianceandexternalmandates,and40%forinternalorcompanyspecificmandates(Figure1).Riskassessmentandremediationprioritizationarefoundationaloffensivesecuritypractices,helpingidentifysecurityweaknessesinanITenvironmentanddeterminingwhichhavethemostpotentialforharm.
Thisprovidesguidancefororganizationsonwheretoallocateresourcesformitigation.
Thoserespondentswhoreportedsolelyusingpentestingforriskassessmentandremediationprioritizationmayberelyingonamoreadhocsecurityapproach.However,
riskassessmentisakeycomponentofanyvulnerabilitymanagementprogram,whichisanestablishedstrategyofidentifying,classifying,prioritizing,andremediatingweaknessesinanITenvironment.
Whileapenetrationtestwillalwaysprovidehelpfulinsights,organizationscanachievemorewithaformalizedprogram,inwhichtoolscanworkintandemtoprovidemaximumcoverageandimpact.Externalandinternalmandatesarealsorelatedtooneanother,inthattheybothsetcybersecuritystandardstowhichorganizationsmustadhere.
Thekeydifferenceisthatexternalmandatesaresetbyregulatorybodies,governmentagencies,orsomeotherentitywhileinternalmandatesarecompanyspecific.Becauseexternalmandatesareenforceablebylawandcanimposefinesorotherconsequences,theyaretypicallygivenpriorityoverinternalmandates,whichthedataseemstosuggest.However,
itisstillworthhavinginternalmandates,astheyarewrittenwiththespecificneedsoftheorganizationinmindandoftengobeyondthebaselineofcybersecuritythatissetbyexternalregulations.F32023Penetration
TestingReportReasons
for
Pen
TestingWhydoesyourorganizationperformpenetrationtests?69%62%58%40%8%RiskassessmentandremediationprioritizationVulnerabilitymanagementprogramsupportComplianceorexternalmandatesInternalorcompanyspecificmandatesOtherFigure
1:ReasonsforperformingpenetrationtestsF42023Penetration
TestingReportCommon
Security
ConcernsRansomware(72%),phishing(70%),andmisconfigurations(58%)wereonceagainthetopsecurityconcerns(Figure2)forsurveyrespondents.Accordingto
Verizon’s
2022
Data
Breach
InvestigationsReport,therewasa13%increaseinransomwarebreaches,accountingfor25%ofallbreaches.
Withransomwareonaseeminglyendlessupwardtrajectory,it’s
unsurprisingthatitisthemostcommonconcernthisyear.
Ransomwareisalsocloselylinkedwithphishing,withphishingemailsservingasthenumber
one
deliverymethodforransomwarepayloads.Alloftheseconcernsshareonethingincommon:theinescapablethreatthatemployeesinadvertentlyposetoorganizations.Additionally,unintentionalinternalthreats(54%)werethefourthtopconcern(Figure2).
Thisisalargecategoryofthreatsthatconsistofanyactionsfromemployees,contractors,orthird-partyvendorsthatinadvertentlyresultinsecurityincidents.
Thismayincludemisconfigurations,failuretofollowsecuritypolicies(i.e.strongpasswords,ignoringsoftwareupdates,etc.),orevenlosingone’semployeeIDcard.Thoughpartofthebroadercategoryofunintentionalinternalthreats,misconfigurationswereactuallyaslightlybiggerconcernforrespondents.
Thismaybeduetohowwidespreadthey’vebecome.AsITinfrastructurescontinuetogrowincomplexity,thereisthatmuchmorepotentialforerrorsandoversightsintheconfigurationofhardware,software,ornetworksettings.Unfortunately,misconfigurationsthrowthedoorforattackerswideopen,andwereultimatelyresponsiblefor14%ofallbreachesin2022.Supplychainattacks(44%),inwhichamaliciousactorcompromisesanoutsidepartnerorsuppliertoconductattacksagainstthesupplier’scustomers,canalsooccurasaresultofunintentionalinternalthreats.
Thisstrategyisincreasinglypopularamongstattackers.Infact,the
Verizonreportstatedthat61%ofsystemintrusionincidentsweresupplychainattacks.Unsurprisingly,ransomwareisoften
used
insupplychainattacks,makingtheconcernarounditallthemorejustified.F52023Penetration
TestingReportCommon
Security
ConcernsWhatcommonsecurityrisks/entrypointsareyoumostconcernedabout?2022202380%68%72%70%57%
58%55%54%55%43%49%44%43%29%26%26%25%17%n/an/an/an/aRansomwarePhishingMisconfigu-rationsInternalThreatsInternalThreatsLackofpatchingSupplychaincompromiseWeakpasswordsLackofencryptionLost/stolendevicesOrphanedaccounts(unintentional)
(intentional)Figure
2:CommonsecurityconcernsF62023Penetration
TestingReportGeneral
Pen
Testing
ChallengesFeelingsonthevalueofpenetrationtestingremainthesame,with94%ofrespondentsonceagainnotingthatpenetrationtestingisatleastsomewhatimportanttotheirsecurity(Figure4).ifallappearswell.However,
cybersecurityrequiresconstantappraisalandflexibility,readjustingandpivotingasattackersfindnewtechniques,tactics,andvulnerabilities.
This15%dropcouldreflectthattherealityofthecurrentthreatlandscapeissettingin.Whiletheviewontheimportofpentestingremainedsteady,thereweresomechangesinthechallengesthatarebeingencounteredinpentesting.First,troublegettingaqualifiedthird-partyisnotablyreduced,down15%from2022(Figure3).Pen
testingisarapidlygrowingmarket,withresearchpredictingtoseeamarketgrowthof$2.6
billion
by2030.
Thismeansmorethird-partyserviceofferingstochoosefromeveryyear.
However,
suchgrowthmakesitworthexercisingextremecautionwhenchoosingaserviceprovider,asthequalitywillvarygreatly.Manyfocusonbasic,routineteststhatareperformedwithapentestingtool,packagingitasacustomservice.It’s
criticaltofindapartnerwithexpertsthatcantailortheirtestsforyourneedsandgoals,andevenadviseyouonthedifferenttestingoptions.Therewasalsoaconcerningincreaseinthelackofresourcestoactonthefindingsofapentest,up23%fromlastyear(Figure3).
Whilepentestingisaneffectivemeansofdeterminingthequalityofanorganization’ssecurityandflaggingwhichweaknessesareputtingyoumostatrisk,theonlywaytoimproveyoursecuritypostureistofollowthroughwithactionsthatclosethosesecuritygaps,suchaspatching,reconfiguration,orimplementingnewpolicies.Penetrationtestingshouldnotbeseenasaboxtocheck,butratheramapthatneedstobefollowed.Equallyimportantisrepeatingpentestsaftertheremediationprocesstovalidatethatfixeswereproperlyimplemented.Lastly,whilethe15%dropinsecuritypostureconfidence(Figure3)mayappearconcerningatfirstglance,itisactuallybesttoerronthesideofcautionwhenitcomestocybersecurity.Overconfidenceoftentranslatesintostagnationandrigidity,feelingnoneedtoreevaluateF72023Penetration
TestingReportGeneral
Pen
Testing
ChallengesWhatchallenge(s)doesyourorganizationfacewithyourpenetrationtestingprogram?2022202358%45%38%36%35%31%29%30%12%10%TroublegettingexecutivesponsorshipandfundingfortheprogramInabilitytohireLackofqualifiedthirdpartiestodothetestingLackofresourcestoactonfindings/per-formremediationOtherenoughskilledpersonneltodothetesting(internal)Figure
3:PentestingchallengesF82023Penetration
TestingReportGeneral
Pen
Testing
ChallengesHowimportantispenetrationtestingtoyourorganization’ssecurityposture?20222023Howconfidentareyouinyourorganization’ssecurityposture?2022202376%73%56%53%43%38%21%18%6%
6%6%4%NotimportantSomewhatimportantImportantConfidentSomewhatconfidentNotatallconfidentFigure
4:ImportanceofpenetrationtestingFigure
5:ConfidenceinsecuritypostureF92023Penetration
TestingReportCompliance
and
Pen
TestingRegulationslikeHIPAA,
PCIDSS,SOX,
GDPR,ortheCMMCmandateappropriate
protectionofhighlysensitive
data,
likecredit
cardnumbers,
socialsecuritynumbers,
andotherpersonallyidentifyinginformation.
Pen
tests
are
notonlya
way
to
evaluate
anorganization’ssecurity
posture,
buttheycanalsohelpverify
adherence
to
theseregulations,
proving
to
auditors
orotherauthoritiesthat
mandatedsecurity
measures
are
inplace
orworking
properly.complianceneeds,illustratingtheinfluencecompliancecontinuestohaveonpentestingapproaches.Howimportantispenetrationtestingtoyourcomplianceinitiatives?20222023Thoughtherewasadeclinefromlastyear,
pentestingwasstillatleastsomewhatimportanttocomplianceinitiativesfor93%ofrespondents(Figure6).Interestingly,withanincreaseinthenumberofdataprotectionandsecuritylawsandregulations,pentestneedssurroundingcomplianceonlyseemtobegrowing.41%ofrespondentshaveincreasedthenumberofoverallpentestsinresponsetothesemandates(Figure7).71%62%Complianceinitiativesshownosignsofslowing,either.
TheEuropeanCommission
isrevisingtheGDPRin2023tostreamlinecross-borderinstancesofdataprotectionenforcement.Notonlyareexistingregulationsbeingcontinuallyupdatedtoincorporatenewmeasures,newlawsandregulationsarealsoemerging.For
example,in2022,nearly
every
US
state
putforthcybersecuritybills.Additionally,the2023
National
Cybersecurity
Strategy
includesaproposaltoexpandrequirementsforalloperatorsofcriticalinfrastructure.AccordingtoGartner,threequartersoftheworld’s
populationwillbeunderprivacyregulationsin2023.25%31%Whilesomehadtoincreasethenumberofpentestsinresponsetocomplianceinitiatives,othershadtoshifttheirstrategiesinsomeotherway,
whetheritwasexpandingthescopeoftheirtests(29%),addingmoreinternalstaff(23%),orplacingmoreemphasisoncertaintypesoftests,likewebapplication(35%)orsocialengineering(36%)(Figure7).Only16%ofrespondentsreportedthattherewasnoimpacttotheirpentestingstrategiesasaresultof7%4%ImportantSomewhatimportantNotimportantFigure
6:ImportanceofpenetrationtestingforcomplianceF102023Penetration
TestingReportCompliance
and
Pen
TestingHowhastheincreaseincomplianceregulation/mandatesaffectedyourpentestingstrategyorpriorities?41%36%35%32%29%27%25%23%16%16%4%IncreasedquantityofpentestsoverallMoreemphasisonsocialMoreemphasisonwebMoreBroadenedAddedConductedAddedMoreemphasisonNoimpactOtheremphasisthescopeofadditional
morenarrowly
additionalonnetwork
ourpentests
third-partyscopedpen
internalstaff
IoT
Securityengineering/
application
securitytestsphishing
testspenteststestsTestsFigure
7:ImpactofcompliancemandatesonpentestingstrategiesF112023Penetration
TestingReportPhishingWiththeAnti-Phishing
Working
Groupobservingarecord1,270,883totalphishingattacksinQ3of2022alone,it’s
unsurprisingthatphishingisatopsecurityconcernofrespondents(70%)(Figure2).Howoftendoesyourorganizationconductphishingsimulations?20222023Sincephishingisoneoftheoldestattacktacticsaround,howhasitremainedsopervasive?Ultimately,it’s
thehumanelementofphishingthathaskeptitremarkablyeffective.Peoplereceivesomanymessagesandemailsthatit’s
easytobecomecareless,clickingonlinkswhileyourmindiselsewhere.Othersoverlyrelyonspamfilters,whichattackershavebecomeadeptatevading.Spearphishingtechniqueshavealsoimproved,witheverythingseeminglypersonalizedandappearingsoauthenticthatevenacybersecurityprocouldbefooled.23%Ongoing19%15%23%MonthlyQuarterlyAnnuallyNeverThoughphishingattackswillpersevere,oneofthebestdefensesistokeeppeopleontheirtoes.Runningregularphishingsimulationexercisescanhelpserveasaregularinitiativetokeepusersvigilantandtrainthemtoexercisemoreprecaution.24%25%Withthisinmind,itwasencouragingtoseean8%increaseinmonthlyphishingsimulations(Figure8),whichisagoodcadencetopromoteongoingawareness.Newandexistingregulationshavealsounderscoredthethreatphishingposes,with36%ofrespondentsnotingthatcomplianceinitiativeshaveplacedanincreasedemphasisonsocialengineeringtests(Figure7).
Thismayalsobereflectedinthe16%increaseintheusageofthird-partytestingservicesforsocialengineeringtests(Figure19).20%17%18%16%Withgenerative
AI
makingsophisticatedphishingemailsandtextsthenorm,easywaystospotattackslikespellingandgrammarerrorsmaysoonbecomeathingofthepast.Instead,usersneedtoquestiontheintentoftheemailandwhethertherequestmakessense.Doyouoftenreceiveemailsfromthisperson?Isthishowanapplicationallowsasksyoutoauthenticateyourcredentials?Byrunningroutinephishingsimulationcampaignswithfollowupreportsandtrainings,organizationscanfosteracultureofhealthyskepticism.010
2030
40
50
60
7080
90
100Figure
8:FrequencyofphishingsimulationsF122023Penetration
TestingReportPenetration
Testing
FrequencyResultsforpentestingfrequencyhaveremainedconsistent.Asin2022,themajorityofrespondentsare,atmost,pentestingonlyafewtimesayear.
Whilerunningonetotwopentests(38%)isfarbetterthannothing(14%)(Figure9),itdoesraiseconcernsaboutretesting.Aninitialtestprovidesguidanceonremediation,butaretestiscriticalforensuringthesevulnerabilitieshavebeensuccessfullymitigated.Improperlyapplyingapatchmaynotjustleavethevulnerabilityintact,itcanalsoopennewsecuritygaps.Remediationvalidationshouldnotjustbeleftforthenextyear’s
roundoftesting.However,
whenresourcesarelimited,makingabusinesscaseforretestingmayprovedifficult.
Thisalignswiththefindingofrespondentsencounteringchallengeswiththelackoffollowup(58%)frompentests(Figure3).Howoftendoesyourorganizationpentest?2022202313%Never14%10%DailyWeekly8%7%8%Runningtoofewtestsisn’t
ideal,butrunningdailyorevenweeklypentestsmaybeimpractical,sincetheydorequirethealreadyscarceresourcesoftime,budget,andtalent.Inordertorundailypentests,youwouldneedtohavealargepentestingteam.Eventhen,theywouldlikelyonlybeabletorunsmallerpentestsondifferentpartsoftheinfrastructure—runningalargescopepentesteverysingledaywouldbeadifficultchallenge.However,
though8%ofrespondentsreporteddailypentesting(Figure9),just50%ofthoserespondentshadinternalteamsofmorethanfiveteammembers.For
theother50%,itmaybethattheyareinsteadreferringtothefrequencywithwhichvulnerabilityscansarebeingrun.
Vulnerabilitymanagementsolutionsaretypicallyhighlyautomatedandcaneasilybescheduledtorunonadailybasis,whilepentestingrequiresmoreadvanced11%12%17%20%MonthlyQuarterly42%38%planning.1-2timesayearThoserunningmonthly(12%)orevenquarterly(20%)tests(Figure9)aremorelikelytohaveachievedabalance,havingthemeansfortestingandretestingwithoutplacingastrainonresources.However,penetrationtestingfrequencyisaperfectexampleofwherebestpracticescollidewithrealworldpracticalities.Everysecurityteamwillhavetodeterminetheirneedswhilekeepingresourcesandbudgetsinmind.010
2030
40
50
60
7080
90
100Figure
9:FrequencyofpenetrationtestingF132023Penetration
TestingReportIn-House
Penetration
Testing
EffortsHavingpentestingcapabilitiesin-housecanquicklyexpandpentestingefforts,allowingformorefrequenttestsandcoverageofawiderscopeoftheITinfrastructure.It
alsoensuresthatchangestotheinfrastructurearemoreefficientlyassessedtoensurenewsecuritygapsaren’t
opened.
Thisyearshowsasmallamountgrowthofin-housepentestingefforts,witha7%increasefromlastyearinthenumberofrespondentswhohaveaninternalpentestingteamattheirorganization(Figure10).Curiously,thesizeofpentestingteamsseemstobefluctuating,withteamsbothgrowingandshrinking.
Whilethereisa21%increaseinthenumberofteamswith3-5members,thereisan11%decreaseinthenumberofteamswith1-2membersand10%decreaseinteamsof6ormore
(Figure11).Thedecreaseinlargerteamsmaybeillustrativeofthecybersecurityskillsgap,whichcontinuestopersist.Infact,accordingto(ISC)²’s2022
Cybersecurity
Workforce
Study,thecybersecurityworkforcegaphasgrownmorethantwiceasmuchastheworkforcewitha26.2%year-over-yearincrease.In
afieldwithsomanyjobopenings,itwouldn’tbeuncommonfortheretobemoreturnoverandinstabilityinteamsize.Pen
testingtoolsmaybehelpingoffsettheskillsgap,witha14%increaseinthenumberofrespondentswhocitedthatpentestingtechnologyhasatleastsomeinfluenceonanorganization’sdecisiononhavinganin-houseteam(Figure14).Whiletherewasanincreaseinthenumberofrespondentswithin-housepentestingteams,therewerestillmorerespondentswhoeitherhadlosttheirin-houseteamorneverhadonetobeginwith.Reasonsforthelackofanin-houseteamvary,withtopreasonsbeinginsufficientneed(48%),lackoftalent(36%),andlackoffunding(28%)(Figure13).Interestingly,thereisa12%decreaseinrespondentscitinginsufficientneedforafull-timepentestingteam.Thismayreflectagrowingacknowledgementoftheusefulnessofin-housepentestingteams,orevenpentestingingeneral.F142023Penetration
TestingReportIn-House
Penetration
Testing
EffortsDoyouhaveanin-housepenetrationtestingteam?20222023Howmanydedicatedteammembersdoesyourin-housepenetrationtestingteamhave?2022202353%48%41%41%42%40%37%19%18%14%14%11%14%7%YesNo,butwehaveinthepastNo,we'veneverhadanin-housepenetrationtestingteam1-23-56-10Morethan11Figure
10:In-housepenetrationtestingFigure
11:In-housepentestingteamsizeF152023Penetration
TestingReportIn-House
Penetration
Testing
EffortsWhatistheaveragenumberofyearsofexperienceyourin-houseteamhaswithpenetrationtesting?2022202356%34%32%24%22%19%3%10%1yearorless2-3years4-5years6ormoreyearsFigure
12:Yearsofexperienceofin-housepentestingteamF162023Penetration
TestingReportIn-House
Penetration
Testing
EffortsWhydoesyourorganizationnothaveanin-housepenetrationtestingteam?2022202360%48%36%34%28%
28%30%19%22%19%4%8%LackoffundingNotenoughneedtoemployafull-timepentester/teamLackofexecutivesponsorshipLackoftalent/skillsetLeveragethirdpartiesexclusivelyOtherFigure
13:Reasonsfornothavinganin-housepentestingteamF172023Penetration
TestingReportIn-House
Penetration
Testing
EffortsHowdoespenetrationtestingtechnologyinfluenceyourorganization’sdecisiontohaveornothaveanin-housepenetrationtestingfunction?2022202347%46%37%32%21%17%StronginfluenceSomeinfluenceNoinfluenceFigure
14:InfluenceofpentestingtechnologyF182023Penetration
TestingReportThird-Party
ServicesThird-partypentestingteamsremainapopularresource,with78%ofrespondentsleveragingthird-partyteamsinsomecapacity(Figure18).However,
therewasanoteworthyshiftindicatinganincreasedpreferenceforin-housetesting,witha16%dropinthosewhousedmostlyorexclusivelythird-partyservicesanda13%increaseinthosewhouseallormostlyin-housetesting(Figure18).
Thoughmanyassumeanin-houseteamismeantasareplacementforthird-partyservices,organizationsshouldideallyuseboth,soitwaspromisingtoseeevenamodest5%increaseinthosewhohaveanevensplitbetweenin-houseandthird-party.Lastly,thoughtheyareusedmostoftenfornetwork(81%)andapplication(65%)testing,itisworthpointingoutthatthird-partiesareutilizedby36%ofrespondentsforphysicalpentests(Figure19).Thesetestsinvolveattemptingtogainentrytoaphysicalfacility,system,ornetworkthroughtheexploitationofweaknesseslikedoors,locks,cameras,orotheraccesscontrols.Suchassessmentscanonlybecompletedbythird-parties,furtherhighlightingtheuniqueservicestheycanprovide.Whatmakesanevensplitideal?
Whileaninternalpentestingteamcanprovideregular,standardizedtesting,theyalsobecomequitefamiliarwiththeenvironmentthatthey’reassessing.
Thetopreasonthird-partyservicesaresolicitedisbecauseoftheirexternal,objectivepointofview(58%)(Figure15).Additionally,sincethird-partyteamsarefullyimmersedspecialiststhatcanstayuptodateonthelatesttrendsandtechniques,theyarealsofrequentlyutilizedtoapplydifferentskillsets(50%).
Wantinganimpartialassessmentandadiversityofskillsmayalsobeareasonforwhy76%oforganizationstendtochangeservicesatleastevery2-3years(Figure17).Therewasa13%dropintheuseofthird-partyservicesforcompliance.Asmentionedearlier,complianceregulationsareexpandinginnumberandcomplexity,sothismaybemoreofareflectionofteamsmanagingtheircomplianceneedsinternallyratherthanoutsourcing.Manyfalselyassumethatinordertomeetcomplianceneeds,third-partytestingisrequired.However,
thistypicallyisnotthecase.In
fact,PCIDSS,whichhassomeofthemostexplicitrequirementsforpentesting,doesnotstatethatathird-partytestisnecessary.Someorganizationsfindthird-partyservicesidealfordeterminingcomplianceneedsandobtainingstrategicsupportwithinitialtests.
Theythenusepentestingtoolstomaintaincompliance.F192023Penetration
TestingReportThird-Party
ServicesWhydoesyourorganizationutilizethird-partypenetrationtesters?2022202363%58%58%56%50%45%38%32%6%4%Togainanexternal,objectivepointofviewTomeetcompliancerequirementsToapplydifferentskillsetstotheenvironmentNotenoughskilledpersonnelinternallytodothetestingOtherFigure
15:Reasonsforutilizingthird-partypentestingservicesF202023Penetration
TestingReportThird-Party
ServicesHowoftendoyouconductthird-partypenetrationtests?2022202355%54%22%19%7%7%8%12%12%
5%3%4%OngoingMonthlyQuarterlyAnnuallyEvery2-3yearsEvery3+yearsFigure
16:Frequencyofthird-partypentestsF212023Penetration
TestingReportThird-Party
ServicesHowoftendoyouchangewhichthird-partypentestingserviceyouworkwith?2022202341%24%20%23%18%14%14%12%Never,weusethesameoneeverytimeEvery2-3yearsAnnuallyEverypentestweconductFigure
17:Rotationfrequencyofthird-partypentestingservicesF222023Penetration
TestingReportThird-Party
ServicesWhatisthecurrentsplitbetweenusinginternalandthird-partypentestingresources?2022202327%24%22%23%20%18%17%18%17%14%AllinternalMostlyinternalEvenlysplitMostlythird-partyAllthird-partyFigure
18:Splitbetweeninternalandthird-partypentestingservicesF232023Penetration
TestingReportThird-Party
ServicesWhchtypesofpenetrationtestsdoyouutilizethird-partytestersfor?2022202381%
81%68%65%48%46%44%36%33%30%23%22%4%3%NetworktestingApplicationtestingSocialengineeringCloudsecurityPhysicalpenetrationtestingIoTsecuritytestingOtherFigure
19:Typesofpenteststhird-partytestersarerequestedtoperformF242023Penetration
TestingReportOther
SecurityAssessment
ServicesDoyouuseanyoftheseothersecurityassessmentservices?Justasorganizationsmayhavecomplementarysolutionsintheiroffensivesecuritytoolkit,th
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年网络安全管理硕士研究生入学考试试题及答案
- 2025天津大型股份制银行外包市场助理岗位(北方人力外包项目)招聘考试备考试题及答案解析
- 2025北京建工集团(广州)建设有限公司招聘笔试参考题库附答案解析
- 工程项目风险评估的数据处理办法
- 2025河南森源电气招聘笔试参考题库附答案解析
- 2025云南曲靖市马龙区鸡头村街道招聘城镇公益性岗位人员1人笔试模拟试题及答案解析
- 海尔某著名企业冰意式箱搜狐推广方案
- 2025吐鲁番市鄯善县消防救援大队招聘政府专职消防员(18人)考试备考试题及答案解析
- 2025山东体育学院招聘博士人员5人(第二批)笔试模拟试题及答案解析
- 2025年周口市淮阳区招专职消防员15名笔试参考题库附答案解析
- 黄冈市临床重点专科申报-模板-副本
- SB/T 10460-2008商用电开水器
- GB/T 9124.1-2019钢制管法兰第1部分:PN系列
- GB/T 29414-2012散热器恒温控制阀
- 2023年黔西县(中小学、幼儿园)教师招聘考试《教育综合知识》题库及答案解析
- GA 1800.2-2021电力系统治安反恐防范要求第2部分:火力发电企业
- 运输供应商年度评价表
- PCB线路板基础知识课程课件
- 断亲协议书范本
- 外科学课件-创伤总论
- 同安区中小学人工智能教育三年行动计(2022年—2024年)
评论
0/150
提交评论