Scoring your vulnerabilities
Remember how we used the "gut feeling" we had about the kind of attacker that could compromise a system (In Chapter 4, Approaching and Planning the Test) to gauge the time per scenario? We can use the same approach to build a scoring matrix that can be formally validated upfront with our client.
Our scoring matrix is usually a two-dimensional array along the following two dimensions:
- Technical complexity or probability of occurrence of the risk (depending on the specific circumstances)
- Impact
For the technical complexity, it could very well happen that we over- or under-evaluated the effort put into a specific scenario. With the actual vulnerabilities in hand, we can be much more precise about the actual technical complexity that was necessary to compromise the device's function.
The actual impact has to be discussed in advance with the client. It is very clear that an SME and a giant, multinational group will cope...