Not all security assessments are equal.

In this post I explore the key differences between some very common and often misunderstood security assessments. Each have their place in the market, but all too often we see these products miss-sold! An exploitability assessment and a vulnerability assessment is not a penetration test (pentest)!!
Understanding Vulnerability Assessments, Exploitability Assessments, and Penetration Tests:
In the field of cybersecurity, grasping the subtle differences between various security assessments is essential for sustaining a strong defense against possible threats. Three frequently employed techniques are vulnerability scans, exploitability scans, and penetration tests. Each method fulfils a specific role and provides unique perspectives on an organisation’s security status.
Vulnerability Assessments:
A vulnerability assessment is a systematic, automated procedure designed to pinpoint potential weaknesses within an organisation’s IT infrastructure, encompassing networks, systems, applications, and devices. Its main objective is to uncover known vulnerabilities that attackers might exploit. Vulnerability assessment is typically performed using specialised software tools that compare the scanned elements against databases of known vulnerabilities.
Key Characteristics:
-
Automated: Conducted using automated tools.
-
Broad Scope: Scans a wide range of assets.
-
Non-Intrusive: Does not attempt to exploit vulnerabilities.
-
Regular Frequency: Can be performed regularly (e.g., weekly or monthly).
Benefits:
-
Provides a high-level overview of potential vulnerabilities.
-
Helps in maintaining compliance with standards like PCI DSS.
-
Allows for continuous monitoring and early detection of vulnerabilities
Exploitability Assessments:
An exploitability assessment advances beyond a vulnerability scan by not only detecting vulnerabilities but also evaluating their potential for exploitation. This assessment simulates an attack to ascertain if the identified vulnerabilities can be leveraged to gain unauthorised access or inflict damage.
Key Characteristics:
-
Semi-Automated: Combines automated tools with manual verification.
-
Focused Scope: Targets specific vulnerabilities identified in previous scans.
-
Intrusive: Attempts to exploit vulnerabilities to verify their impact.
Benefits:
-
Provides a more accurate assessment of the actual risk posed by vulnerabilities.
-
Helps prioritize remediation efforts based on exploitability.
-
Offers insights into the potential impact of successful exploits.
Penetration Tests
A penetration test, or pen test, is an in-depth and practical method of security evaluation. It entails mimicking actual cyberattacks to identify vulnerabilities that malicious individuals might exploit. Penetration tests are conducted by skilled professionals who use a combination of automated tools and manual techniques to identify and exploit vulnerabilities.
Key Characteristics:
-
Manual and Automated: Involves both automated tools and manual testing.
-
Targeted Scope: Focuses on specific systems, applications, or network segments.
-
Highly Intrusive: Actively exploits vulnerabilities to assess their impact.
Benefits:
-
Provides detailed information on vulnerability exploitability and potential consequences.
-
Helps organisations understand the real-world impact of security weaknesses.
-
Offers actionable recommendations for improving security posture.
The Importance of CREST Accreditation
In a competitive market, I frequently suggest considering providers with CREST accreditation. Holding a CREST accreditation signifies a high level of quality and reliability in the cybersecurity sector. CREST (Council of Registered Ethical Security Testers) is a globally acknowledged accreditation organisation that establishes stringent standards for cybersecurity service providers.
Why CREST Accreditation Matters:
-
High Standards: CREST accreditation ensures that the service provider adheres to rigorous technical, legal, and ethical standards.
-
Skilled Professionals: CREST-certified professionals have extensive experience and must pass stringent exams to demonstrate their expertise.
-
Customer Assurance: Using a CREST-accredited provider reassures clients, partners, and customers that their data is protected by top-tier security practices.
-
Regulatory Compliance: CREST accreditation supports compliance with various regulations, including PCI DSS, GDPR, and ISO 27001.
-
Up-to-Date Knowledge: CREST members are regularly updated on the latest security threats and best practices, ensuring they provide the most current and effective security solutions.