Vector
Vector

Choose your topics

Blogs
How to Prioritize Your Third-Party Risks

How can you prioritize effectively and enhance your organization’s security posture? Here are our top tips for setting up realistic, sustainable processes.

Third-Party Risk Management GRC
Blogs
Top Tips to Save Time When Assessing Third-Party Risks

Is assessing third-party risks taking up too much of your time? How can you make the process more effective and efficient? Find out in the latest post from SureCloud.

Third-Party Risk Management GRC
Blogs
The GRC Trends to Look Out for in 2024

Our GRC experts at SureCloud share their 2024 predictions for the world of governance, risk and compliance.

GRC
Blogs
The Top 5 Challenges of Third-Party Risk Management

With the supply chain now seen as a legitimate attack path, what can your organization do? Let’s explore 5 challenges of TPRM and how to overcome them.

Third-Party Risk Management GRC
Blogs
What is Third-Party Risk Management?

What is third-party risk management and how should you approach it? Find out in this post.

Third-Party Risk Management GRC
Blogs
The Top 4 Challenges of Risk Management

What are the top four challenges of risk management today and how can you overcome them? Find out in this post from SureCloud.

Third-Party Risk Management GRC
Blogs
Transform Compliance into Your Competitive Advantage

In GRC, compliance is often viewed as a cost that makes it harder to pursue growth. Here's how to make it your competitive advantage.

Compliance Management GRC
Blogs
Questions You Should Ask when Preparing For Your First Pen Test

Understand the processes that you and your chosen pentest provider will travel through for your first pen test, from the initial point to the day the test starts.

Penetration Testing
Blogs
TPRM Blog 6-Writing Clear Questions

Our GRC Practice Director explores the importance of clear communication and how to achieve it in your third party questionnaires. Read more here.

Third-Party Risk Management GRC
Vector (7)
Vector-1
Penetration Testing

Dealing with requests from your pentesters I Are you ready for your first test? Blog 2

Dealing with requests from your pentesters I Are you ready for your first test? Blog 2
Written by

Martin Ellis

Published on

20 Jan 2020

Dealing with requests from your pentesters I Are you ready for your first test? Blog 2

 
 

In our previous blog, we discussed the levels of traffic a penetration testing can bring to your site and applications and how best to prepare for it which you can read here. Continuing on the discussion lets look at some of the other elements that need to be considered…

Email

Does your system rely on email as part of its workflow? It is common for workflows to use emails for processes such as password resets, but also to communicate important updates to internal users. If a single HTTP request can trigger an email, expect your application to be sending thousands of emails.

As with the levels of traffic discussed above, it is worth considering how this might affect you; might you fill-up the email recipients’ inboxes or trigger a spam protection system? It may be worth configuring or modifying your application to batch messages into single emails to reduce the amount of traffic being sent or test these features of the application in an environment that does not email real users. It should also be considered that if any change is made temporarily, like those suggested, this may affect your test coverage due to the environment not matching the normal case.

 

Requests from your testers

You may receive requests from your testers during the test, and you will need someone on hand the handle this. These requests may range from simple account management issues, such as a tester needing accounts unlocked, through to technical questions. It is important to understand that your tester is not trying to trick you but is trying to be as efficient with testing as possible.

There is one proviso to the above however, and that’s if social engineering has been agreed as part of your scope. This is out of scope of this article, beyond highlighting the importance of making it clear what is and isn’t in scope for social aspects, and still maintaining a clear line of communication even while this is taking place.

 

What to do when things go wrong?

So, something unexpected has happened, or something has gone wrong. Your first step is always to reach out to your testers; a clear line of communication should have been agreed upfront. Where appropriate, ask them to pause what they are doing to give you breathing space but understand this will cut into your testing time.
Always remember that although your testers are looking for security issues, they are trying to help you, not cause issues. They will work with you as much as they can to make the process as easy as possible.

We hope this has provided you with peace of mind and helps you through your first tests. We will continue this series of posts with some advice on what to do post-test in an upcoming blog.