CREST Defensible Penetration Test Released

CREST Defensible Penetration Test Released

Across the globe it is widely acknowledged that the definitions, practices and expectations associated with a penetration test are inconsistent and fluid. This makes it difficult to define or parameterise a series of activities that looks at all possible requirements, engagements or scenarios. For example, a penetration test may need to assess a mobile phone at one end of the spectrum or an aircraft carrier at the other.

This new CREST guidance provides a best practice framework for penetration test defensibility and an assurance of penetration tester competence. It will help organisations that are looking to procure penetration testing services and organisations that deliver penetration testing services.

Only when the following three elements are satisfied, will the CREST Defensible Penetration Test be commercially defensible:

  • The need for penetration testing service providers to have appropriate policies, procedures, practices and methodologies
  • The need for all individuals involved in a penetration test to have appropriate levels of skills, experience and competency
  • The need for penetration testing service providers and the individuals conducting the assessment to work towards a defined and agreed test specification

Get the guide here:

https://www.crest-approved.org/wp-content/uploads/2022/08/CREST-Defensible-Penetration-Test-v5.pdf

Thanks to Steven Teppler Rowland Johnson Kyle B. Edward Farrell Bhrugvish Gore Rodrigo Marcos Paul Underwood Erin Jones Laura Wright and others who helped shape this project

要查看或添加评论,请登录

Tom Brennan的更多文章

  • No BS Advice

    No BS Advice

    On April 18th I was invited by Apptega to present guidance on harmonize your technology program aligned with the my…

    2 条评论
  • STAR WARS Cyber Security Plan

    STAR WARS Cyber Security Plan

    What did Star Wars teach us? G33k with me..

    1 条评论
  • What percentage of revenue is for IT expenses?

    What percentage of revenue is for IT expenses?

    There is no set percentage of profit that should be spent on IT and risk management, as it can vary depending on the…

  • CIO / CTO What Is the Difference?

    CIO / CTO What Is the Difference?

    A CIO (Chief Information Officer) and a CTO (Chief Technology Officer) are both senior-level positions within a…

  • 2023 travel plans? Don't forget the Security

    2023 travel plans? Don't forget the Security

    Personal security when traveling for business can be challenging, especially when traveling internationally. Here are…

  • Tech Kids?

    Tech Kids?

    Helping children understand security with technology can be challenging, but protecting them from cyber threats is…

  • Organizational Effectiveness

    Organizational Effectiveness

    I was recently asked by a member of the International Legal Technology Association (ILTA) about measuring the…

  • TECHNOLOGY TEAMWORK

    TECHNOLOGY TEAMWORK

    Building teamwork in an IT department can be challenging, but it is essential for the success of the department and the…

  • Securing the Software Supply Chain: Recommended Practices for Developers

    Securing the Software Supply Chain: Recommended Practices for Developers

    Unmitigated vulnerabilities in the software supply chain pose a significant risk to organizations. The Recommended…

  • Got Threat Intelligence?

    Got Threat Intelligence?

    OpenCTI is a platform allowing organizations to manage their Cyber Threat Intelligence knowledge. From the strategic…

社区洞察

其他会员也浏览了