官术网_书友最值得收藏!

Defining business objectives

Based on the assessment requirements and the endorsement of services, it is vital to define the business objectives. This will ensure that the testing output benefits a business from multiple aspects. Each of these business objectives is focused and structured according to the assessment requirements and can provide a clear view of the industry achievement. We have formatted some general business objectives that can be used to align with any penetration testing assignment. However, they can also be redesigned according to the change in requirements. This process is important and may require a pentester to observe and understand the business motives while maintaining the minimum level of standards before, during, and after the test is completed. Business objectives are the main source to bring the management and technical team together in order to support a strong proposition and an idea of securing information systems. Based on the different kinds of security assessments to be carried out, the following list of common objectives has been derived:

  • Provide industry-wide visibility and acceptance by maintaining regular security checks.
  • Achieve the necessary standards and compliance by assuring business integrity.
  • Secure the information systems holding confidential data about the customers, employees, and other business entities.
  • List the active threats and vulnerabilities found in the network infrastructure, and help to create security policies and procedures that should thwart known and unknown risks.
  • Provide a smooth and robust business structure that will benefit its partners and clients.
  • Retain the minimum cost for maintaining the security of an IT infrastructure. The security assessment measures the confidentiality, integrity, and availability of the business systems.
  • Provide greater return on investment by eliminating any potential risks that might cost more if exploited by a malicious adversary.
  • Detail the remediation procedures that can be followed by a technical team at the organization concerned to close any open doors, and thus, reduce the operational burden.
  • Follow the industry best practices and best-of-breed tools and techniques to evaluate the security of the information systems according to the underlying technology.
  • Recommend any possible security solutions that should be used to protect the business assets.
主站蜘蛛池模板: 六盘水市| 绵竹市| 汕尾市| 河间市| 得荣县| 清苑县| 康定县| 河源市| 北辰区| 章丘市| 龙里县| 太仆寺旗| 丘北县| 中山市| 花莲市| 卫辉市| 密山市| 吉安市| 屏山县| 云南省| 武邑县| 调兵山市| 元阳县| 遵义县| 三江| 巩留县| 丰都县| 景洪市| 高清| 乐平市| 砚山县| 镇平县| 韶山市| 盐城市| 滦平县| 松滋市| 山丹县| 郧西县| 丹棱县| 扎鲁特旗| 岳池县|