How to manage your Vendor's Pen Test [Outsource] effectively?
You [Auditor] have to check whether:
- The agreements are in place such Contract, SLA and especially NDA agreements
- Formalisation of Authorisation are duly vetted and carried out for this particular job.
- Communication Plan are properly setup and monitored by management
- FQA’s procedure are in place to pre-identify the vendor’s qualification, skills, engineers professional certified and capacity prior agreement sign-off.
- Risk matrix on pen test performance are in place and up-to-date prior conducting a pen test by vendor.
- Sufficient addressing the scope of work and concerned areas to be carried out a pen test.
- Sufficient appreciation of IT threats and Remedial Actions by Senior Management after pen test performed.
- Risk appetites are updated with pen test results prior presenting to the management.
- Test framework and procedure are properly defined and addressed by management and stakeholder prior sign off a contract.
- Penetration test activities are fully covered such:
- Identifying targets from publicly available information
- Unauthorised internet connection detection
- War Driving and War Walking
- Manual Detailed Testing
- Attempt to exploit weakness in employee activity such social engineering attacks, honey trap, phishing…
- Exploit physical controls
- Minimal possibility of false positives (nothing false in stealing the flag!)
- Codes and compilation tests
- Back-end structure and middleware test
- Network vulnerability scan
- Telephony / remote access testing
- Wireless vulnerability scan
- Password / Pin compromising test
- Evaluation response procedure are in place and up-to-date
- The reports of penetration test are qualified to the test activities done.
- The pen test report are well known the IT threats updates and its implication to the business operations and customers.
- The pen test report are detailed solution to correct or minimise the identified findings or weakness with a cost estimate as appropriate.
- Post test are dully addressed and verified by risk management or CARA team on its implication and news threats detected.
- The remedial actions / strategies on system loopholes are dully and properly treated and response by relevant stakeholders on this particular concerns.
- The pen test activities are well monitored and documented by custodians or authorised officer in-charge.
How to manage your Vendor's Pen Test [Outsource] effectively?
Reviewed by Unknown
on
2:27 AM
Rating:
No comments: