Guide to Choosing a Security Assessor

advertisement
White Paper
Guide to Choosing a Security Assessor
www.solutionary.com
(866) 333-2133
Guide to Choosing a Security Assessor
Guide to Choosing a Security Assessor
Contents
Introduction .......................................................................................................................3
Consider More Then Cost Alone .......................................................................................3
Characteristics of a Security Assessor..............................................................................3
Top 25 Questions for Potential Assessment Partners .......................................................5
Other Considerations ........................................................................................................6
Conclusion: Choosing the Right Partner ..........................................................................7
About SCS.........................................................................................................................8
About Solutionary ..............................................................................................................8
2
Guide to Choosing a Security Assessor
Introduction
Technical assessments are a necessary part of an information security program. They
help identify gaps and provide insight into an organization’s current security posture.
Types of security assessments include vulnerability scanning, penetration testing,
application security assessments, infrastructure assessments and physical controls
assessments.
Security assessments can focus on specific compliance requirements or frameworks.
When preparing for a security
assessment, organizations should
consider:
1.
including any recent changes
Whether company standards follow HITRUST CSF, ISO, COBIT, COSO, NERC or
PCI DSS, organizations should hire a security assessment firm with experience and
Regulatory requirements,
2.
knowledge that match those of the organization’s unique compliance and business
New systems, applications and
environments
requirements. This guide will cover the key considerations for choosing a security
assessment partner.
3.
Gaps in previous audits and
remedial action taken
Consider More Than Cost Alone
4.
Specific protection of sensitive
information
The choice of an assessor should go beyond cost alone. Like any other service, the
quality of work performed can vary, depending on the experience of the assessor, as
5.
Scoping to ensure appropriate
coverage
well as the tools, techniques and methodologies used.
6.
Every security assessment criteria may vary; therefore organizations should choose an
Identified security initiatives and
associated budget
assessor with appropriate levels of experience and competency that meet the business
needs.
7.
Skillsets and experience of
internal staff
The characteristics of the internal security team also matter. A more mature,
experienced security team may not require the same level of communication from the
assessor as less experienced teams.
Characteristics of a Security Assessor
All assessors are not alike. Years of experience are just as, if not more, important
than obtaining certifications, since certifications alone do not guarantee hands-on
experience.
3
Guide to Choosing a Security Assessor
The company performing the security assessment should have the following
characteristics:
•
Trusted advisor, not just an auditor. It is important that an assessor identifies
positive results to reinforce company progress and practices. As an advisor, the
assessor should provide recommendations for improving the business environment
Request resumes of the actual
beyond the security and IT departments.
assessors in order to verify they have
proven expertise and appropriate
•
•
Excellent track record of finding vulnerabilities while not affecting business
certifications. The company should
operations. Technical security assessments, like penetration tests, carry a level of
also be able to prove that any
risk and may be intrusive to a network. An experienced security assessor should
of the assessors performing the
be able to conduct intrusive security testing while allowing the business to function
assessment satisfactorily passed a
seamlessly without disruption of continuity and production.
background check.
Ability to go beyond automated tools. There are many excellent tools available for
finding vulnerabilities in networks and applications. These tools, however, are only
as good as the people using them. Most assessors use automated tools as part of
their assessment toolkit, but also should be able to employ manual techniques to
find and exploit vulnerabilities.
•
Expertise in investigating and identifying security gaps while escalating critical
and serious findings in real-time. The risk levels found in a security assessment
will vary, depending on the threat the vulnerability poses to the company. A good
assessor will know how to determine which vulnerabilities are high risks and
immediately escalate this critical information to management.
•
Qualified professionals performing the assessment. The assessors who perform
the actual assessment should have appropriate expertise. Request resumes of
the actual assessors in order to verify they have proven expertise and appropriate
certifications. The company should also be able to prove that any of the assessors
performing the assessment satisfactorily passed a background check.
•
Ability to gather actionable findings and incorporate them into a road map of
strategic and tactical next steps. An assessor should define a plan to ensure
steps are in place to evaluate the entire environment. The assessor should provide
4
Guide to Choosing a Security Assessor
feedback that will help establish the resources and action items required to mitigate
findings in the short-term, as well as develop a security roadmap for the long-term.
•
Proven ability to contribute and provide a well-written report. The information
gathered from an assessment is critical to the improvement of an organization’s
Asking key questions will provide
security program. An assessor should be able to gather and translate the key
an understanding of an assessor’s
findings for overall risk, as well as, provide recommendations for eliminating
approach, methodology and
identified risks in an easily understood deliverable. An experienced assessor should
experience.
be able to provide, upon request, samples of reports and other deliverables.
•
Demonstrable financial stability. The company performing the security assessment
should be able to demonstrate financial viability, stability and profitability of its
business.
Top 25 Questions for Potential Assessment Partners
Before engaging an assessment firm, organizations should make sure the firm is a good
fit for performing the assessment. Asking key questions will provide an understanding
of an assessor’s approach, methodology and experience. Key questions for potential
assessors include:
1.
How long have you been in business?
2.
How many assessments have you performed?
3.
Do you have experience assessing an organization like ours?
4.
Can you provide references?
5.
How good is the assessment team? What is the experience level of the
assessor(s)?
6.
Where are the assessors based? Are they located domestically or offshore?
7.
Can you provide resumes for the people who will be performing the assessment?
8.
Do you perform background checks and drug tests on your assessors? If yes, how
often?
9.
5
Do you have regulatory experience that matches our industry requirements?
Guide to Choosing a Security Assessor
10. How much will the assessment cost?
11. Are you going to make recommendations we are actually capable of implementing
given our budgets and business processes?
12. Will the assessment results provide us with a roadmap for improving our overall
security posture?
13. Do you have a security assessment methodology you can share?
14. What is your typical toolset and testing process?
15. Do your assessors only use automated tools or will they also use manual
techniques?
16. How will our sensitive information be protected?
17. How will you provide the reports to us?
18. How clear is your report going to be for technicians?
19. How clear will your report be for our decision makers in management?
20. Can you provide a sample report?
21. Are you going to give us priorities based on risk to our business?
22. Are you going to find something that actually improves our security and fits within
our risk posture?
23. Will the assessment reveal anything that embarrasses the internal team?
24. How much work is the assessment going to create for us once complete?
25. Will we have a designated point of contact?
Other Considerations
Organizations should identify a partner who can understand client needs and
circumstances, helping to ensure assessment observations are clear and unambiguous
and recommendations are practical and meaningful. The ability to truly consider the
impact on the client is what sets a good security assessor apart.
6
The ability to truly consider the
impact on the client is what sets
apart any security assessor from a
good assessor.
Guide to Choosing a Security Assessor
While security and compliance experience are key, organizations should look beyond
these basic requirements and consider partners who have experience in the technology
and industry being assessed. For example, for application security assessments, the
assessor should have familiarity with the language in which the application is written.
Industry knowledge is helpful for benchmarking as well as familiarity with the types of
data being handled and the systems in use.
Organizations should carefully
evaluate potential assessment
partners and choose the provider
Organizations should consider long-term goals when choosing the best security
assessment partner. Some considerations may include:
•
Is the organization being assessed planning an expansion or expanding into new
markets? Changes in the infrastructure may lead to new vulnerabilities. Substantial
changes should be assessed for security.
•
Are new applications being developed or updated internally? New applications,
especially those containing sensitive information should be assessed for security
with every major update.
•
Is the organization developing mobile apps? Make sure the assessor doing
assessments has experience with mobile application security.
•
Do current or new business partners or vendors have access to internal systems?
If so, they should provide proof that they have had a recent security assessment or
agree to having one completed.
•
Will the organization be subject to new compliance requirements or adopting a new
security framework? A long-term assessment partner can assist in mapping those
requirements to the assessment results.
Conclusion: Choosing the Right Partner
Choosing the right security assessment partner is an important decision in an
organization’s overall security life cycle. While cost is certainly a factor, there are other
important considerations that should not be overlooked. Organizations should carefully
evaluate potential assessment partners and choose the provider that best fits the
organization’s needs — for both the short-term and the long-term.
7
that best fits the organization’s
needs — for both the short-term
and the long-term.
About Solutionary Security Consulting Services
Solutionary Security Consulting Services (SCS) specializes in the delivery of
independent security guidance, security controls validation, standards-based
compliance and remediation design and support. SCS consultants engage in
recurring, scheduled security and compliance initiatives or short‐term, one‐time
projects; whichever best meets the needs of the organization.
Solutionary Assessment Services include:
•
box and black box):
SCS Offensive Security Services include technical security control testing
(infrastructure, application layer and device penetration testing), security architecture
design and evaluation services, social engineering and physical security assessments.
Governance Risk and Compliance Services include services to assess and support
security frameworks and mandates including the Payment Card Data Security
Standard (PCI DSS), the HITRUST Common Security Framework, HIPAA/HITECH, ISO
27001:2 and others.
Penetration Testing (white box, gray
•
SCS Offensive Security Services helps organizations discover security risks
and comply with regulations. Solutionary consultants proactively test networks,
applications, devices and physical controls using real-world attack scenarios
and manual exploitation techniques to identify and remediate risk-based security
exposures.
•
About Solutionary
•
Network
•
Application
•
Mobile Application
•
Wireless Access
•
Workstation/Server
Social Engineering:
•
Physical Security Exploitation
•
Email Phishing
•
Telephone Social Engineering
•
Social Media
Advanced Multi-Vector Attack
Simulation (Red Team/ Blue Team)
Solutionary, an NTT Group security company (NYSE: NTT), is the next generation
managed security services provider (MSSP), focused on delivering managed
security services and global threat intelligence. Comprehensive Solutionary security
monitoring and security device management services protect traditional and virtual
IT infrastructures, cloud environments and mobile data. Solutionary clients are able
to optimize current security programs, make informed security decisions, achieve
regulatory compliance and reduce costs. The patented, cloud-based ActiveGuard®
service platform uses multiple detection technologies and advanced analytics to
protect against advanced threats. The Solutionary Security Engineering Research
Team (SERT) researches the global threat landscape, providing actionable threat
intelligence, enhanced threat detection and mitigating controls. Experienced, certified
Solutionary security experts act as an extension of clients’ internal teams, providing
industry-leading client service to global enterprise and mid-market clients in a wide
range of industries, including financial services, healthcare, retail and government.
Services are delivered 24/7 through multiple state-of-the-art Security Operations
Centers (SOCs).
Contact Solutionary at info@solutionary.com or 866-333-2133
Solutionary, an NTT Group security company, is the next generation managed security services
provider (MSSP), focused on delivering managed security services and global threat intelligence.
ActiveGuard® US Patent Numbers: 7,168,093; 7,424,743; 6,988,208; 7,370,359; 7,673,049; 7,954,159; 8,261,347.
Canadian Patent No. 2,436,096. Solutionary, the Solutionary logo, ActiveGuard, the ActiveGuard logo, are registered
trademarks or service marks of Solutionary, Inc. in the United States. Other marks and brands may be claimed as the
property of others. The product plans, specifications, and descriptions herein are provided for information only and subject
to change without notice, and are provided without warranty of any kind, express or implied.
Copyright ©2015 Solutionary, Inc.
Solutionary.com
Solutionary, Inc.
9420 Underwood Avenue
Omaha, NE 68114
1270WP
1/15
Download