The tests intrusion or pentests

The threats of cyberattacks weigh more and more on businesses and communities. Your organization likely handles sensitive or personal data. It is very likely that she is connected to the internet and uses various services such as messaging, file sharing, unified communications, marketing, etc.

Recommended or required by several methodologies, standards and regulations such as ISO/EIC 27001 or PCI DSS, the "pentest" or intrusion test aims to analyze the IT infrastructure and simulate an attack coming from a malicious user or harmful software.

icon-down-circled

Internal or external ?

icon-up-circled
The objective of a pentest is to evaluate the level of security of an infrastructure, a web service or even an e-commerce site. To do this, the auditor (or commonly called pentester or ethical hacker), will test the target by simulating real attacks.

External

This form of audit can be performed on targets outside the company, such as websites accessible on the internet or public APIs. The penetration testing professional (pentester) carries out these tests remotely, via a basic internet connection. It will imitate attacks carried out by malicious parties anonymously.

Internal

This type of audit can also be carried out internally, directly from the company's premises. In this configuration, the pentester simulates malicious actions from inside the company. The objective is to assess the level of risk linked to a possible compromise by an employee, a partner or a service provider of the company.

Once the perimeter has been determined, it is appropriate to choose what type of pentest will be carried out.

Black Box

The “Black Box” approach involves assessing the security level of the target without having any prior information. In this situation, the listener places himself in the position of a classic malicious actor. This approach requires a well-defined methodology as well as time to thoroughly explore the target.

Grey Box

The "Grey Box" approach aims to maximize effectiveness by optimizing the time and scope of the attack. The pentester receives a restricted set of information to define the scope of analysis. This allows the pentester to concentrate his efforts on this defined perimeter.
The approach adopted in this context is unbiased. Any equipment or application accessible from the internet is subject to evaluation. However, whether the penetration test is carried out using a “Black Box” or “Grey Box” approach, communication between the company and the auditor plays a vital role. It is crucial to precisely define the perimeter, manage incidents, etc. so that the result is as relevant and complete as possible for the customer. Whether to draw up a current assessment or as a step when implementing new products, the intrusion test (or pentest) is essential to assess your level of security. It is added to your overall cybersecurity system.