Network Security Testing Explained

Network security testing is a sequence of repeatable steps that identify vulnerabilities and weaknesses in an organization’s network. This blog outlines these steps, explains why they are crucial, and offers tips to help readers maximize the effectiveness of their testing.

Selecting a network security testing methodology

For organizations that need to demonstrate compliance with specific industry standards, start by selecting a network security testing methodology, such as NIST SP 800-115. A testing methodology ensures that the organization follows a predefined and repeatable testing process.

For organizations seeking to conduct a focused risk assessment, methodologies like NIST are too broad. For these organizations, the first step is to define the objectives of network security testing. A customized testing methodology can be subsequently defined to support these specific goals.

Pro Tip:

Use the same methodology to verify subsequent remediation actions.

Defining the organization’s test objectives

Test objectives set the direction for the testing activities. Network security test objectives should be focused on areas of the network that support business-critical functions or contain sensitive data. Table 1 provides a list of network areas typically considered business-critical.

Network areaExamples
Internal trusted networkCore internal network
Perimeter networkInternet-facing services such as Email and VPN servers
User and device authentication infrastructureNetwork Access Control (NAS) systems
Identity management systems
Network security infrastructureMonitoring and control systems
Patch and configuration management tools
Mobile device infrastructureWireless networks
BYOD support infrastructure
Internet of Things (IoT) and Operational Technologies (OT)Building and industry-specific control systems

Table 1: Typical business-critical network areas

Testing objectives can vary significantly between organizations, depending on their industry, size, applicable compliance and regulatory requirements, and the technology implemented. For example, a bank might focus testing on the internal trusted network, network security infrastructure, and PCI compliance. In contrast, a hospital may focus on testing around perimeter networks, mobile device infrastructure, and HIPAA compliance requirements.

Objectives should clearly state the aspects of the network being tested. Example objectives are:

  • Verify that the internal trusted network conforms to the stated security policies and recommended configurations.
  • Identify vulnerabilities in the internal and external trusted network.
  • Conduct a penetration test (pen test) to check whether malicious actors can access network resources.

Pro Tip:

Link objectives to measurable results, such as reducing vulnerabilities by 20% or reducing the number of network components that do not meet the stated configuration guidelines by 20%.

Establishing what is in and out of scope

A scope statement describes what will be tested and the conditions under which the tests will be performed. Its primary purpose is to align the business stakeholders and the technical team responsible for testing. In addition to listing the objectives and deliverables, the scope statement should include:

  • In-scope items.
    These are the network areas, components, and services to be tested. For example, the internal trusted networks for core VLANs and subnets, DNS/DHCP services, and firewalls and IPS security appliances.
  • Out-of-scope items
    These are the specific areas, assets, or activities that are explicitly excluded from testing. For example, specific IP address ranges, operational systems, and Denial-of-Service tests.
  • Testing constraints.
    These are the rules for conducting the tests. For example, testing is to be conducted between 6 PM and midnight using the staging non-production network.

Pro Tip:

Identify the affected stakeholders and obtain stakeholder sign-off on the scope statement. Formal sign-off helps avoid misunderstandings, scope changes, and conflicts during the testing process.

Identifying the network security tests to be performed

Although the requirements vary, the fundamentals of security controls remain the same. This consistency enables the use of similar types of tests across diverse organizations. Table 2 lists common areas of network security testing.

Test areaDescription
Configuration reviewsChecks the network device security settings against the organization’s baseline or industry benchmark
Data protectionEvaluates the use of secure cryptographic suites and certificates
Log verificationEnsures events are recorded
Monitoring validationChecks if alerts are generated and actioned
Network scanning and connectivity testsVerifies segmentation, zoning, firewall rules, and authentication methods
Packet sniffersAnalyzes network traffic for unexpected traffic and abnormalities
Port scanningIdentifies open, closed, and filtered ports
Radio frequency sniffersDetects rogue wireless devices
Vulnerability scanningChecks switches, firewalls, routers, and servers for known weaknesses

Table 2: Common network security test areas

The breadth of these network areas means that testing requires a diverse set of different tools, techniques, and skill sets. Tool selection should be based on the network area being tested and the kind of test being conducted. For example, Network Mapper (NMAP) is an open-source tool that scans ports and discovers network services, and Aircrack-ng is a free tool that injects wireless traffic and performs various attacks on wireless networks.

Pro Tip:

Network security testing can negatively impact the performance and operations of the network. The potential impact and consequences must be understood before the test is performed, allowing for precautions to be taken to minimize disruption.

Gathering network and vulnerability information

It is essential to have a clear understanding of the network topology, including connected devices and the services and protocols running over the network. This helps ensure that tests do not miss critical areas of the network or are incomplete.

To determine what should be tested, gather information about the organization’s internal network and publicly known data on security vulnerabilities and attacks. Table 3 lists the types of network information to be collected. 

InformationExamples
Business-critical systemsChecks the network device security settings against the organization’s baseline or industry benchmark
Asset inventoryFirewalls, switches, and routers
Security control mechanismsAccess control systems, Access Control Lists (ACLs), Virtual Local Area Networks (VLANs), and traffic protection
Network security policiesAcceptable use, remote access, password, and change management
Regulatory and compliance requirementsNetwork topology and data flow diagrams
Threat intelligenceKnown industry attacks and technology weaknesses, such as weak cryptographic algorithms

Table 3: Information gathered at the start of network security testing

Pro Tip:

Internal interfaces used to manage network equipment are often perceived as having a lower risk and are excluded from testing. However, if firmware updates are being done using the insecure File Transfer Protocol (FTP), an attacker could intercept the login credentials and gain administrative control of the device.

Performing the network security tests

To ensure repeatability, testing should follow a structured and controlled process. Test documentation should clearly outline the step-by-step process of performing the test, including the tools and configurations used, as well as the measurements taken.

Ideally, network data should be captured during the test execution. Network data may include screen captures, logs, scan results, configuration dumps, and packet capture (pcap) files. Timestamps should be included to facilitate the analysis of test findings in conjunction with other network events.

Tests should be monitored to ensure that they are not significantly impacting business operations. If tests have an unexpected negative impact on network operations, they should be reported immediately. It may be necessary to take corrective actions, which may include restoring the network to its original state.

Pro Tip:

Providing advance notice of pending network security tests can result in users changing their behavior, which can skew the test results. It is advisable to limit notifications to trusted stakeholders or key personnel.

Reporting actionable test results

The most important step is turning the test results into actionable items. Interpreting the test results and prioritizing the high-risk issues allows resources to be effectively directed to the problem areas.

To enable the remediation team to focus resources on having the most significant impact:

  • List the discovered issues using a high, medium, and low severity ranking. Show the associated impacted asset(s) and recommended fixes.
  • Group the recommended fixes into immediate, medium-term, and long-term solutions.

Testing metrics and Key Performance Indicators (KPIs) are measures of the organization’s network robustness in defending against cyberattacks. These measurements are also crucial for verifying that the remediation actions effectively address the identified issues and tracking improvements over time.

The metrics and KPIs vary depending on the organization’s security goals, size, and compliance and regulatory requirements. Example metrics categories are shown in Table 4.

Network security functionExample metric or KPI
Vulnerability trackingThe number of high severity vulnerabilities open for longer than four weeks
Access control and identity managementThe percentage of accounts protected by multi-factor authentication
Configuration controlThe number of configuration guideline policy violations
Monitoring and reportingThe number of unresolved critical and important alerts
Asset and inventory controlThe number of end-user devices with antivirus protection installed
Awareness and user trainingThe number of employees who have completed security training

Table 4: Key network security functions and example metrics

Pro Tip:

Implement a tracking system to monitor the progress and completion of remediation actions.

Establishing a schedule for network security tests

The test schedule depends on the organization’s perceived risk exposure, available resources, and regulatory requirements. For example, some organizations run vulnerability scans on an ongoing basis, whereas others perform them only in response to audit requirements.

Many tests can be automated, for example, scanning for known vulnerabilities and verifying that firewall policies are implemented correctly. Automating tests is crucial for organizations with a limited workforce or those that require the ability to detect problems more quickly. Tests that require manual intervention by definition cannot be fully automated. 

Pro Tip:

Retain test scripts and configurations to support consistent and repeatable testing, and to enable accurate re-testing after remediation actions have been implemented.

What to do after reading this blog

After reading this, you should:

  • Review the testing methodology your organization uses for conducting the network security tests.
  • Identify the business-critical components in your organization’s network.
  • List the security test tools your organization uses and identify what each tool is designed to test.
  • Determine which network tests are automated and run on a defined schedule.
  • Examine your organization’s testing metrics, PKIs, and trends to identify opportunities for improvement.
Author Bio –
Author and public speaker

Dr. Avril Salter is an author and acclaimed public speaker with over 20 years of in-depth technical and executive experience working in wireless and network security. She holds senior business and technical architect positions with a history of success in setting direction in major corporations and start-ups. She has an exceptional breadth of technical expertise in wireless standards and network security protocols and is a strategic thinker with a solid understanding of the IT and telecommunications industries.

CyberScope®

Edge Network Vulnerability Scanner

CyberScope empowers you to quickly discover, identify, and test edge infrastructure and IoT, OT, and ICS devices, wired (Ethernet/Fiber) and WiFi networks, then assess cybersecurity posture against policies, generate reports and perform ongoing monitoring—all without deploying agents.

CyberScope® Air

WiFi Vulnerability Scanner & Tester

CyberScope Air enables SecOps or NetOps teams to discover, validate, and scan edge infrastructure and IoT, OT, and ICS devices whether WiFi or Bluetooth/BLE. Assessing cybersecurity posture of WLANs against policies, generating reports, and performing ongoing monitoring for changes has never been easier.

More Posts