When looking to have some sort of technical security assessment performed, the range of options can seem bewildering. The efficacy, convenience and price of the myriad of choices is overwhelming, and from an organisation’s perspective, the differences between offerings can be challenging to discern. Hopefully, this short blog helps to explain the differences and benefits of each type of assessment.
Definitions
Let’s start by defining our terms:
VA (Vulnerability Assessment)
This is a fully automated scan which seeks to identify known vulnerabilities that are present. Common tools for this are Nessus, Qualys and OpenVAS.
DAST (Dynamic Application Security Test)
This is an automated assessment of a web application. It’s like a vulnerability scan, but with more ability to authenticate and navigate an application. Common tools for this are Burp, ZAP, and AppCheck.
AI (Artificial Intelligence)
This is a newer type of automated assessment, which uses artificial intelligence (AI) to replace the consultant/tester. It aims to replicate a penetration test.
PT (Penetration Test or Pen Test)
This is an assessment where a consultant/tester makes use of automated and manual tooling to conduct a technical security assessment.
YMMV (Your Mileage May Vary)
URM recognises that each of these services differ, and that they each have their place in maintaining an organisation’s security posture. However, care should be taken to ensure that the service selected fits the organisation’s objectives.
Differences
Now that we know what each term means, we should look at the differentiators of each type of assessment. Each of them has their advantages and drawbacks.
Vulnerability Assessment
VAs are a key part of security assessment. Due to their relatively low cost and convenience factor, they can be run regularly to ensure that an organisation’s security posture is maintained.
The drawback to vulnerability assessments is their coverage. Being fully automated, they perform a pre-defined series of checks and tests, expecting specific responses in order to identify a vulnerability. This leads to false positives (things reported as vulnerable erroneously), as well as false negatives (where things that are vulnerable are not reported). Between these two, it can take quite some time to validate the findings present in a VA report.
Finally, due to the fully automated nature of VAs, VA reports are solely technical findings. They often fail to discuss impact, and won’t group or contextualise findings in order to aid the organisation in understanding or remediating findings.
Dynamic Application Security Test
DASTs are ultimately a more focussed form of VA that solely target web applications. Their capabilities are improved over a VA when assessing applications, as they can authenticate to applications and have more thoroughly defined sets of tests to perform.
Just like a VA though, DASTs are prone to false positives and negatives, and their report will be machine generated.
Artificial Intelligence
AI testing makes use of the above assessments, but uses some form of artificial intelligence to try and extend the testing performed, as well as aid in the quality of the report.
The effectiveness of AI assessments varies wildly by vendor, and, as a new and expanding market segment, marketing is running rampant with wild claims. Pricing can also be surprisingly high for AI-based assessments given their automated nature.
Based on URM’s visibility of AI guided testing, it should be viewed with similar scepticism as self-driving cars. A great idea, still in its infancy, and probably a long way from being ready for widespread use – despite what marketing teams may claim!
Penetration Testing
Penetration testing is the assessment that takes the most time from an organisation to conduct; scoping calls need to be performed, pre-requisites need to be provided, and the consultant may need technical assistance during the test. Then, once the test is completed, there is a delay whilst a report is written and goes through a quality control process. This, combined with the (sometimes) higher cost, means that pen tests are performed less frequently than fully automated testing.
However, the time investment from the organisation allows a human expert to better understand the scope of the test and perform checks and tests in context (even linking multiple tests together), resulting in security findings that automated tests (even with the guidance of AI) cannot identify.
The consultant will make use of the automated testing types identified above, but will validate the false positives and negatives, ensuring that the findings present in the report are as accurate as possible. The report will also contain more than just the technical findings, with information about business impact, areas of general weakness/strength, and interpretive language, which makes the report easier to read and quicker to action.
![](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/67ade1f01ad578c18677efb4_Technical-Security-VA-PT-AI-DAST.png)
Summary
Hopefully the above has provided some insight into the different types of technical security assessment available. Beware of marketing or sales tactics which claim to offer all of the benefits, but none of the drawbacks – as the old adage goes: if it sounds too good to be true, it probably is.
By utilising the above types of assessment appropriately, organisations can gain good visibility of their security posture and maintain that posture, all whilst minimising time and financial expenditure.
How URM Can Help?
As a CREST and CREST OVS-accredited organisation, URM can offer a range of penetration testing services with the assurance that the efficacy and trustworthiness of the testing you receive from us has been externally verified.
URM can offer network and infrastructure penetration testing to help you identify and remediate vulnerabilities within your organisation’s environment. This can be either internal or external penetration testing, allowing you to determine the level of risk to your organisation both from compromised users with a degree of legitimate access, and from external threats. Meanwhile, we can also conduct web and mobile application penetration testing, cloud pen testing, and business-led pen testing, depending on your organisation’s requirements and concerns. All of URM’s crest penetration testing is offered with a free retest of any critical or high-risk vulnerabilities we identify within 30 days of the original test, allowing you to ensure the greatest risks to your organisation are mitigated quickly.
URM is pleased to provide a FREE 30 minute consultation on penetration testing for any UK-based organisation.
If you are unsure, URM can perform CREST-accredited internal and external penetration testing against all IP addresses associated with your organisation, location, or service.
Designed to assess the architecture, design and configuration of web applications, our web application pen tests use industry standard methodologies to identify vulnerabilities.
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663395d3790b636e6eefcc6d_Blog-Thumb-Ransomware.jpg)
URM’s blog discusses how to prevent and mitigate the damage done by ransomware attacks, and how penetration testing can help your organisation avoid them.
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/663395d3790b636e6eefcb33_Blog-Thumb-Unauthorised-Access.jpg)
The consequences of unauthorised access are varied. Apart from financial losses, there is a loss of customer confidence. Can penetration testing prevent this?
![Thumbnail of the Blog Illustration](https://cdn.prod.website-files.com/663395d3790b636e6eefc3f0/667d8890cf7aee7f88fcbf5a_Blog-Thumb-Pen-Test-Benefits-2.jpg)
URM’s blog outlines the key steps you can take during and after a penetration test to improve your organisation’s security posture.