The concept of penetration tests is based on the exploitation of identified flaws in order to
measure the real impact on information system security of the audited organization. These tests
simulate attack scenarios prepared in advance under real conditions. The objective is to test
the resistance of the information system to computer attacks from inside or outside the
organization's network (i.e., Internet network).
- • External pen tests: assess the ability of an external
attacker to penetrate internal network of the audited body.
- • Internal pen tests: allow the impact of a malicious act
carried out from inside network of the audited organization to be assessed.
- • Red Team: used to assess the impact of a malicious act by
exploiting all possible scenarios (social engineering, physical or logical intrusion, etc.)
BEGONIA GROUP's audit approach is based on:
- • ANSSI (National Agency for Information
Systems Security)
- • SANS (SysAdmin, Audit, Network,
Security)
- • CIS (Center for Internet Security)
- • publishers' security standards as well
as the state of the art auditee's specific business constraints.
Generally, these tests are carried out according to
the following steps:
- • Identification of the audited scope;
- • Search for vulnerabilities;
- • Implementation of attacks (exploits);
- • Impact measurement;
- • Proposal of recommendations and corrections.
In this case, the penetration test will proceed as
follows:
- • Passive Recognition (using Cyber Threat Intelligence)
- • Black box approach: The tester has no prior knowledge of the
environment before the attack;
- • Gray box approach: the tester has partial knowledge of the
environment to be audited;
- • White box approach: the tester has all the information that
allows him to examine the complete architecture and not just the directly visible attack
surface.
N.B: In order to avoid consequences related to
possible malfunctions on a production environment, it is preferable to carry out penetration tests
on a test or pre-production environment in order to avoid system to stop or critical data
alteration.
For every approach, BEGONIA GROUP will schedule a
feedback meeting to discuss the identified vulnerabilities and at the end of the audit, a closing
meeting will present a summary report, the scenarios of exploitation of certain vulnerabilities and
the list of recommendations.
Later, BEGONIA GROUP offers you a “validation audit” to ensure and verify that the corrective
measures proposed during the audit have been correctly implemented.