-
Notifications
You must be signed in to change notification settings - Fork 19
Expand file tree
/
Copy pathFAQ
More file actions
65 lines (55 loc) · 5.08 KB
/
FAQ
File metadata and controls
65 lines (55 loc) · 5.08 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
== Penetration Testing Execution Standard - the FAQ ==
==== '''Q''': What is this "Penetration Testing Execution Standard"? ====
'''A''': It is a new standard designed to provide both businesses and security
service providers with a common language and scope for performing
penetration testing (i.e. Security evaluations). It started early in 2009 following a discussion that sparked between some of the founding members over the value (or lack of) of penetration testing in the industry.
===='''Q''': Who is involved with this standard?====
'''A''': We are a group of information security practitioners from all areas of
the industry (I.e. Financial Institutions, Service Providers, Security
Vendors). The group currently consists of:
*[http://twitter.com/indi303 Chris Nickerson], CEO - [http://www.lares.com Lares Consulting].
*[http://twitter.com/hackingdave Dave Kennedy], President/CEO - [https://www.trustedsec.com/blog/ blog] [https://www.trustedsec.com/ TrustedSec] .
*[http://twitter.com/chrisjohnriley Chris John Riley], IT Security Analyst - [http://blog.c22.cc blog] Raiffeisen Informatik GmbH.
*[http://twitter.com/infosecmafia Eric Smith], Partner - [http://www.lares.com Lares Consulting].
*[[User:iamit|Iftach Ian Amit]], Director of Services - [http://www.iamit.org/blog blog] [http://www.ioactive.com IOActive].
*[http://www.pentest-standard.org/index.php?title=User:drew Andrew Rabie], Wizard - [http://www.avon.com/ Avon Products Inc].
*[http://twitter.com/stfn42 Stefan Friedli], Senior Security Consultant - [http://www.scip.ch scip AG].
*[[User:Meeas|Justin Searle]], Senior Security Analyst - [http://www.inguardians.com InGuardians].
*[http://twitter.com/kaospunk Brandon Knight], Senior Security Consultant - [http://www.securestate.com/ SecureState] .
*[http://twitter.com/carnal0wnage Chris Gates], Senior Security Consultant - [http://carnal0wnage.attackresearch.com/ blog] [http://www.lares.com Lares Consulting].
*[http://twitter.com/j0emccray Joe McCray], CEO - Strategic Security.
*[http://twitter.com/Carlos_Perez Carlos Perez], Lead Vulnerability Research Engineer - Tenable Security.
*[http://twitter.com/strandjs John Strand], Owner - Black Hills Information Security.
*[http://twitter.com/steve_tornio Steve Tornio], Senior Consultant - Sunera LLC.
*[http://twitter.com/c7five Nick Percoco], Senior Vice President - SpiderLabs at Trustwave.
*[http://twitter.com/daveshackleford Dave Shackelford], Security Consultant, SANS Instructor.
*[http://twitter.com/attackresearch Val Smith] - Attack Research.
*[http://twitter.com/digininja Robin Wood], Senior Security Engineer - [http://www.digininja.org/ blog] [http://www.randomstorm.com RandomStorm].
*[http://twitter.com/wimremes Wim Remes], Security Consultant - EY Belgium.
*[http://twitter.com/isdpodcast Rick Hayes], Force Practice Lead - [https://www.trustedsec.com/ TrustedSec] .
===='''Q''': So is this a closed group or can I join in?====
'''A''': We started this with about 6 people, the first in-person meeting held
almost 20. We would love more insight and down-to-earth opinions so if you
can contribute please feel free to email us.
===='''Q''': Is this going to be a formal standard?====
'''A''': We are aiming to create an actual standard so that businesses can have
a baseline of what is needed when they get a pentest as well as an understanding of what type of testing they require or would provide value to their business. The lack of
standardization now is only hurting the industry as businesses are getting
low-quality work done, and practitioners lack guidance in terms of what is
needed to provide quality service.
===='''Q''': Is the standard going to include all possible pentest scenarios?====
'''A''': While we can't possibly cover all scenarios, the standard is going to
define a baseline for the minimum that is required from a basic pentest,
as well as several "levels" on top of it that provide more comprehensive
activities required for organizations with higher security needs. The
different levels would also be defined as per the industry in which they
should be the baseline for.
===='''Q''': Is this effort going to standardize the reporting as well?====
'''A''': Yes. We feel that providing a standard for the test without defining
how the report is provided would be useless. We will define both executive
(business) reporting as well as technical reporting as an integrated part
of the standard.
===='''Q''': Who is the intended audience for this standard/project?====
'''A''': Two main communities: businesses that require the service, and service providers. For businesses the goal is to enable them to demand a specific baseline of work as part of a pentest. For service providers the goal is to provide a baseline for the kinds of activities needed, what should be taken into account as part of the pentest from scoping through reporting and deliverables.
===='''Q''': Is there a mindmap version of the original sections?====
'''A''': Following popular demand, we have _a_ version of the mindmap used when creating the first drafts of the standard available for download [http://iamit.org/docs/Penetration_Testing_Execution_Standard.mm here] (in FreeMind format).