Security builder & leader

Technical and Political Boundaries of Security Assessments

Security assessment scoping involves both technical and political boundaries, since testing efforts are often artificially constrained by which teams control which systems. Defining rules of engagement realistically requires asking clients about prior experiences, success criteria, and procedures for handling scope changes.

Technical and Political Boundaries of Security Assessments - illustration

Agreeing on the scope of a security assessment, such as a penetration test, is easier said than done. Define the scope too narrowly, and you will miss the vulnerabilities another attacker could have exploited. On the other hand, an overly-wide or ambiguous scope can unnecessarily increase the cost of the assessment and put at risk careers of people involved with the project.

Defining the Scope

The boundaries between vulnerability categories aren’t always clear. Consider a penetration test scoped to a web application. The tester discovers that the app’s service account has overly permissive cloud IAM permissions, allowing access to resources well beyond the application itself. Is that an application finding or a cloud infrastructure finding? The app team didn’t configure IAM. The cloud team didn’t build the app. Jake Williams highlighted this kind of ambiguity as far back as 2013, and it remains a common source of friction between testers and clients.

Defining the scope is as much of a technical as it is a political issue. Many assessments focus exclusively on “web applications” or only on “network services,” instead of combining the two efforts, because these resources are usually maintained by different teams. As a result, the funding for these assessments comes from different sources and different people will be blamed for security problems.

Unfortunately, this means that many penetration tests fail to adequately mimic a typical attacker’s actions, because the scope of the assessment is artificially constrained.

Who Is Responsible for What?

One way to determine whether a particular vulnerability is in scope is to ask the client whether they are the ones responsible for patching that vulnerability. That’s not satisfying, I know. The good news is that the assessor can still provide value by asking questions about the vulnerability, explaining its significance and highlighting that someone within the client’s organization should take a look at it.

A well thought-out penetration test will define the rules of engagement in a realistic manner without drawing these artificial boundaries. A consultant should strive to define the rules of engagement and the scope in this “fused” manner when selling the assessment. Similarly, organizations should combine these types of testing efforts into a single engagement, even if it means that two different teams need to collaborate and pool their budgets.

In practice, the best approach is to report all findings, even those outside the formal scope. A vulnerability doesn’t become less dangerous because two teams drew a boundary through it. Documenting it and explaining its significance helps the client route it to the right people.

Talk to the Client Before Starting the Assessment

Thinking along these lines, consider asking the following questions before committing to or starting the engagement:

To further improve your security assessment skills, consider reading my Cheat Sheet for Creating Security Assessment Reports.

About the Author

Lenny Zeltser is a cybersecurity executive with deep technical roots, product management experience, and a business mindset. He has built security products and programs from early stage to enterprise scale. He is also a Faculty Fellow at SANS Institute and the creator of REMnux, a popular Linux toolkit for malware analysis. Lenny shares his perspectives on security leadership and technology at zeltser.com.

Learn more →