Vulnerability Scanning vs Penetration Testing
One of the most important security processes any organization can undertake is the discovery, assessment, and mitigation of vulnerabilities in their IT systems. While both vulnerability scans and penetration tests are used to discover vulnerabilities in systems with a good deal of overlap, they approach the process slightly different and perhaps even with different goals in mind.
First though, what are vulnerabilities and why should we care about them?
“Vulnerabilities are flaws in a computer system that weaken the overall security of the device/system. Vulnerabilities can be weaknesses in either the hardware itself, or the software that runs on the hardware. Vulnerabilities can be exploited by a threat actor, such as an attacker, to cross privilege boundaries (i.e. perform unauthorized actions) within a computer system. To exploit a vulnerability, an attacker must have at least one applicable tool or technique that can connect to a system weakness.”
Source: https://en.wikipedia.org/wiki/Vulnerability_(computing)
Now that you have an idea of what vulnerabilities are, what are the important differences between a vulnerability scan and a penetration test? And, why should you care?
The biggest, and most important, difference between vulnerability scanning and penetration testing is the depth in which they go. Both discover and identify potential vulnerabilities in systems and may even use similar tools such NMAP, Nessus, and open source intelligence. Where they really differ is in what they do they with the collected information and who is involved in the process.
Vulnerability Scanning
- Discovers known vulnerabilities
- High-level identification
- Generates a list based on signatures and system info
- Risk of false positives
- Identified vulnerabilities must be confirmed or ruled out
- Find the low-hanging fruit to help improve general security stance
- Can be manual, on-demand, or automated
- Shorter turn around time
- Generally non-invasive
- More affordable
Penetration Testing
- Discovers known vulnerabilities
- Takes a hacker perspective
- Manual process – may confirm whether vulnerabilities are exploitable or not (rules out false positives)*
- More targeted and focused
- Can identify a greater set of risks
- Must be scheduled due to longer engagement time, scope of testing, and rules of engagement
- Can be disruptive
- Higher costs
Vulnerability scanning takes the information gathered from the tools and creates a nice looking report that highlights the main issues and concerns the organization should take a look at. These issues and concerns may not be valid (false positives), could miss issues (false negatives), or they may be valid, but addressed through other security controls. A major benefit of vulnerability scans is the fact they can be automated and performed on a regular basis, allowing you to easily track changes in vulnerabilities and system baselines over time.
Penetration testing uses the same kind of information gathered from vulnerability scanning and takes it a step farther by attempting to exploit the vulnerabilities the tester discovered. The benefit of this is you should learn whether or not the vulnerabilities identified during the test are real and exploitable. The drawback is a pentest can be expensive and highly involved, and if you haven’t already gone through a series of vulnerability scans and remediation, it may not be very difficult at all for an experienced pentester to compromise your systems.
So, which option should you choose? Well, it all depends on how mature your security and patching practices are. If you’ve hardened your systems and environment by patching all of your software, disabling unneeded services, disconnected old systems you no longer use, and mitigated everything you can think of, maybe you’re ready for a pentest. If you haven’t even covered the basics, you should start with a vulnerability scan and assessment.
Starting with a vulnerability scan and assessment allows you to find the low-hanging fruit and fix issues before your organization becomes the low-hanging fruit for a malicious actor. Vulnerability scanning is the first step along the path to better organizational and system security.
If you’re interested in beginning your organization’s security journey, reach out to us today. Arcus Consulting provides a variety of products and services to support you in protecting your critical assets.