Chapter 6: Designing and Managing Security Testing Processes
Now that you have a good understanding of the controls that can be put into place so that you have a functioning security strategy in your organization, my guess is that you've implemented several of them, and now, you're free to just chill out, browse LinkedIn, and watch Netflix on your work computer for the next few years until your retirement. Congratulations! You've earned the gold watch.
Oh, you just got pwned. Whoops. How did that happen? Well, there was a huge gap that you didn't consider in your design, and you didn't have anybody else sanity check the architecture, nor did you have any internal or external team perform a penetration test on your environment. You want a second pair of eyes, and often, you'll want that second pair of eyes to be a technical wizard – one with no ties to your organization, who isn't concerned about offending their colleagues or bosses with...