It’s not just your external IT environment, but also internal networks and applications that must be secured against breaches. While external penetration testing has become common practice, compliance with the Payment Card Industry Data Security Standard (PCI DSS) also requires the lesser-known internal penetration testing. Internal pen testing should be performed at least annually, and following any significant modification or upgrade to applications or infrastructure.
Internal pen testing needs to be standard practice
External pen testing highlights potential breaches coming from outside, such as attacks on exposed web applications. Internal pen testing mimics an attack from inside your organisation’s internal networks and applications and assesses its potential impact. There are two main types of internal cyber-attack patterns:
Individuals with ‘insider’ access, and updating applications, are common situations that carry a potential risk of a security breach. For this reason, internal pen-testing needs to become routine, alongside external pen-testing.
Even SAP users of shared business-critical applications – such as Enterprise Resources Planning (ERP), Human Capital Management (HCM) and Supply Chain Management (SCM) – are finding security gaps to be a common issue. These gaps often arise from the lack of visibility in SAP and uncoordinated internal security procedures, without proper security strategies in place. This is why routine internal pen testing is strongly recommended for SAP users.
Another scenario would be when an attacker compromises one of the server in your cloud environment and there is a communication channel open between the cloud environment and your network (e.g VPN tunnel). An attacker could use that as an entry point into your network.
Cyber security issues with cloud computing
Cloud computing has exploded into the mainstream, and has evolved to a preferred solution for data storage, service on-demand and infrastructure. Many organisations use shared, multi-tenant environment cloud services, which is where the issue of cyber security arises. There are several challenges to securing cyber assets within the cloud.
Who is responsible for cloud security?
First, it’s important to consider who is responsible for cloud security. There have been several incidents of breached cloud environments by cyber attackers. High profile attacks include those on iCloud, Target, Home Depot, Sony Pictures and the United States Internal Revenue Service. All these attacks took place due to loopholes in public, private and hybrid clouds through various attack vectors. In these instances, the Cloud Service Providers (CSPs) cannot be blamed exclusively for the security breaches.
It’s a common misconception that CSPs are solely responsible for the cyber security of information in the cloud. In fact, responsibility also falls to the organisation itself. It is your obligation to ensure that what you upload to the cloud is secure – whether it’s customer information, platform and internal applications, internal network, access management and data encryption. CSPs are really only responsible for securing the basic infrastructure that supports the Cloud. Internal penetration testing should, therefore be applied to your cloud environments as well.
How internal penetration testing works
Internal networks and applications
Internal pen testing your cloud environment
Internal pen testing for in-house infrastructure can be performed by a highly skilled internal IT team or a trusted third party service. Pen testing a cloud environment is, however, somewhat different. Many CSPs don’t allow pen testing because they have multi-tenant platforms and the test may compromise the security of other user organisations.
Here are the alternatives for internal pen testing cloud environments:
Summary
Internal penetration testing is equally important as external penetration testing. It allows your organisation to find – and address – potential vulnerability to cyber-attack by malicious insiders. It is also essential to apply pen testing to internal applications, whether they’re on-premises or in a cloud environment.
It’s important to understand the limitations and types of pen tests Cloud Service Providers allow, and to seek authorisation before performing them. Security of applications and data in the cloud is still a process that needs meticulous planning and constant vigilance.