123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Practical Security Infrastructure Testing

Profile Picture
By Author: creswebs
Total Articles: 72
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

When building and deploying new security infrastructure, the moment eventually arrives where you have to connect your new system to the Internet. This is the moment of truth, where you expose your carefully crafted infrastructure to hackers, crackers, phishers and script kiddies who are always to exploit someone else’ mistakes.
Before you get to this point, you want to have tested the security of you deployment very carefully, and this often gets overlooked in project planning. Many a project has stalled because the business would not approve connecting an untested build to the Internet, and it was not possible to perform effective testing without having the infrastructure connected to the Internet. Consideration should be given to security testing as early as possible in the design phase of the project: who will do the testing, and what sort of access and connectivity will they need? How can that access and connectivity be provisioned without exposing the new deployment to the Internet at large?
TestLogistics (www.testlogistics.net) recommends that the first phase of security testing be conducted in house, ...
... using static testing techniques to ensure that the design and configuration of the new infrastructure complies with the organisation’s security policy, and to establish a working baseline. This work can be started very early in the project, and should ideally be commenced before the detailed design is signed off and before equipment is purchased. Regular review phases will ensure that there is no unapproved “drift” from the baseline.
Melodie Neal (Principal Consultant with TestLogistics, and a Certified Internet Systems Security Professional) recommends that the second phase of security infrastructure testing should be white box style internal testing, conducted from within the network where the new infrastructure resides. In this phase the testers should be given access to the systems either as trusted users, or as attackers who have already breached the defences. The goal in this phase is to uncover vulnerabilities that could be exploited, and to understand the extent of the damage that a successful attack could cause.
External testing should initially be mimicked using a harness to emulate access from the Internet. This type of harness can often be provisioned using a low-end router to provide connectivity for the testers to the “outside” of the infrastructure. Testing in this phase should include a mix of positive and negative testing, to ensure that traffic and transactions that should pass and succeed do so, and that all other traffic is blocked, and that appropriate logging is in place.
Formal penetration testing should always be performed by a third party. A third party is more likely to spot deficiencies that the people who have worked on building the infrastructure. If a third party is engaged to perform internal testing, that work should be completed and the results analysed – and any defects remediated – before external testing proceeds. Both internal and external testing should be re-executed on a regular basis, in line with the organisation’s security policy.
About TestLogistics
TestLogistics is a leading provider of Testing Logistics Solutions (including Test Environments Management, Test Data Management, Harnessing and Test Lab Operations), Technical Testing Solutions (i.e. Performance Testing, Infrastructure, Security, SOA & Test Automation) & Senior Test Consulting Strategy. TestLogistics provide top tier organisations with a range of services which enable significant improvements on quality, delivery and overall value.


a href=http://www.testlogistics.net/"">Test Data Management

Total Views: 301Word Count: 563See All articles From Author

Add Comment

Business Articles

1. The Swaraj 855 The Powerhouse Tractor For Modern Indian Farmers
Author: ttractor gyan

2. Integrating Los With Digital Public Infrastructure And Open Banking
Author: Credacc

3. International Form Filling Data Entry Projects Noida | Zoetic Bpo Services
Author: mohan

4. How To Choose The Best Google Ads Agency For Faster Growth In 2025
Author: Neetu

5. Godrej Trilogy Worli Mumbai | Project Introduction And Developer Info
Author: elitehomesIndia

6. Premium E-liquids Shop In Victoria – Discover Top Flavours At Smoke2snack
Author: smoke2snack victoria

7. Transforming Credit Scores With Trusted Credit Repair Services In Jacksonville And Fayetteville Ar For Long Term Financial Success
Author: Martin King

8. How Stereolithography Works: A 3d Printing Process
Author: 3D Printing For Product Design

9. What Is Customer Satisfaction And How To Achieve It?
Author: DialDesk

10. Used Mercedes-benz Ahmedabad: Why Smart Buyers Choose Pre-owned
Author: Kamdhenu Cars

11. Why 925 Sterling Silver Earrings Are Perfect For Sensitive Ears
Author: 925 Silver

12. The Significance Of Management System Certification In The Transformation Of Saudi Arabia’s Vision 2030
Author: Riya

13. Expert Software Testing Consultancy & Qat Solutions For High-quality Digital Delivery In The Uae
Author: kohan

14. Expert Solutions: Upvc And Aluminium Window And Door Repair Services, Including Glass Replacement And Lock Upgrades
Author: Vikram kumar

15. Lucintel Forecasts The Waste Recycling Service Market In Germany To Grow With A Cagr Of 4.3% From 2025 To 2031
Author: Lucintel LLC

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: