URM is able to provide penetration testing services against all assets associated with your organisation, location or service (e.g., external and internal networks, cloud environments, web or mobile applications). By emulating real threat actors, URM is able to identify vulnerabilities affecting your IT systems, determine the risks to your organisation and provide a prioritised remediation strategy to protect your organisation.
URM can provide the following penetration testing services:
Infrastructure and Network Penetration Testing
URM is able to perform an internal or external infrastructure penetration test against all IP addresses associated with your organisation, location or service (e.g., remote access via a VPN or web application).
By performing an unauthenticated external penetration test, URM is able to determine what information and services are publicly accessible. The test can include reviewing the web services for OWASP (Open Web Application Security Project) top ten vulnerabilities on any publicly available pages (e.g., login pages) and any additional services running on the public IP addresses (e.g., remote access solutions such as Citrix, FTP servers, VPN access for remote administration of infrastructure).
For an internal test, URM can simulate threat actors within your internal network and determine the impact and the risk to your organisation. URM can perform authenticated or unauthenticated testing on your internal network, perform build reviews, review firewall rulesets, test your wireless networks, perform segmentation testing and work with you to design something which is both tailored and appropriate to your organisation.
Web Application Penetration Testing
With this type of service, URM conducts a security review to test the web application from an authenticated perspective. A web application penetration test is a type of ethical hacking engagement designed to assess the architecture, design and configuration of web applications. This test will review each page within the website to understand if any vulnerabilities exist. The penetration test, for example, will identify common web vulnerabilities (e.g., OWASP top 10) using industry standard methodologies, such as the OWASP Web Security Testing Guide (WSTG) and the OWASP Application Security Verification Standard (ASVS).
Where various access levels are available within the application (e.g., administrator vs standard users), URM performs testing to confirm that each access level does not have access to information outside of their level of privilege or tenant.
Cloud Penetration Testing
In addition to our on-premise penetration testing services, URM also delivers cloud penetration testing covering all types of deployments including:
- Various cloud platforms such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP)
- Cloud deployment models such as individually managed virtual machines (e.g., AWS EC2), automated deployments and configuration (e.g., puppet, chef or terraform), cloud services (e.g., Azure App Service, AWS Lambda) or container solutions (Kubernetes and Docker).
We can perform a range of testing including external unauthenticated penetration testing through to security configuration reviews. For example, a test may involve reviewing the externally accessible public IP addresses of a service, the configuration of key web and database components by conducting a CIS benchmark against them and conducting a high-level review of the whole cloud platform account. If the cloud infrastructure is also integrated into existing on-premise infrastructure, then URM can combine this with internal penetration testing.
Mobile Application Penetration Testing
Here, URM conducts a review of the mobile apps that are deployed to either Apple IOS devices or Android devices. The purpose of the review is to understand what vulnerabilities are present within the application to determine what a malicious user could do to the application to prevent it operating as intended. URM, typically, suggests conducting the test against the OWASP Mobile Application Security Verification Standard; this standard provides two-level for verification Medium Risk (Level 1) or High Risk (Level 2). Each level aims to identify key security issues, such as data storage, privacy, authentication, network communications.
As a CREST-accredited organisation, you can be reassured that the policies, processes and procedures which underpin URM’s penetration testing have been independently assessed and deemed to be fit for purpose. URM is able to support you through the whole penetration testing process, providing support during all the phases of the project. Our expert team will assist you during the scoping phase, provide regular updates during the assessment, provide a debrief meeting at the end of the assessment and help you through the remediation process.
We fully understand that the objective of penetration testing is to reduce the risk affecting your organisation’s assets. That is why URM includes a free retest of any high or critical vulnerabilities identified during an assessment in the first 30 days after the assessment, to ensure the highest risks are mitigated as quickly as possible.
One of the major differentiators between URM and other penetration testing organisations is its holistic approach. Not only can URM provide cutting edge penetration tests, but with its governance, risk and compliance background can also provide a whole plethora of policy, process and training solutions to address your security weaknesses.