NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
January 22, 2015

Case Study: COTS Application Penetration Testing

NuHarbor Security

Abstract

Case study of one large state agency testing all vendor supplied applications to ensure that state data is protected. This study covers the early obstacles that come with testing commercial-off-the-shelf (COTS) applications, the successes of comprehensive security testing, and the value provided of improved application security for multiple state agencies.

Download COTS Application Penetration Testing PDF

Client Profile

  • State government agency providing services for state residents.
  • 50+ servers, one data center, heavy reliance on Infrastructure as a Service (IaaS), 200+ client endpoints, and 10 mission critical enterprise applications.
  • Heavy reliance on vendors providing and supporting commercial-off-the-shelf (COTS) applications to deliver on agency strategy.

Key Challenges

The primary driver for the project was to provide agency leadership with a list of security risks that pose a threat to the agency and recommendations for remediation. Agency leadership was also looking for assurances that their technology vendors and partners were securely developing and supporting agency applications as required by their contracts.

The key business challenges included:

  • Application development, maintenance, and patching performed in black-box methodology.
  • Vendors submitted their applications for technical security testing in previous years through work with other state agencies and security firms.
  • One of the largest application development partners providing a major application to this agency and multiple other state governments was apathetic to the idea of technical security penetration testing, citing previous lack of value in the effort.
  • State agency leadership has limited engagement from this application development partner because the partner feels their practices are adequate and maintains a list of high-profile state clients who haven’t expressed security concerns.
  • The application provider offers to provide any one of the nine previous penetration tests provided by other security firms to justify not doing another penetration test.

Since this application contained sensitive information, the immediate goal from agency leadership was to obtain assurance that state information was being protected and application security controls are sufficient.

Solution

The state agency required a security testing solution that was efficient, minimized business disruption, provided comprehensive coverage, and extended the capabilities of internal IT teams to discuss technical security controls with mission critical application providers.

NuHarbor Security and Core Security were brought onboard to leverage their extensive experience working with large Fortune 500 companies and federal entities performing technical security penetration testing and translating results into meaningful operational outcomes that to improve enterprise security posture.

To minimize disruption of the mission critical application, NuHarbor established a security testing process and cadence of communication with agency leadership and the application vendor to ensure full transparency of all penetration testing performed. The security testing process ensured that there were no disruptions to active application development, application availability, or IT support staff.

Core Security provided all technical penetration testing services. Core Security leveraged their extensive tool set which included Core Impact, open-source tools, and technologies developed by CoreLabs to perform all penetration testing. The team from Core Security found numerous vulnerabilities in the application and proved to agency leadership and the application vendor that the vulnerabilities were not false positives by demonstrating active exploits and providing instructions and screen shots on how to perform the exploit.

The results were shared with the application vendor who noted the penetration test performed by Core Security was by far the most comprehensive and valuable test performed in the history of the application. They were impressed that Core Security took the time to explain how the exploits worked, provided instructions on how to exploit, and unpacked the complexities involved in each exploit.

NuHarbor worked with agency leadership and the application vendor to provide security architecture advisory and incorporate risk mitigation techniques into the agency security program to prevent these types of security risks from recurring in the future.

Outcome

  • The vendor became very responsive when they realized they had an elevated risk profile and were cooperative with agency leadership.
  • The vendor performed many application architecture enhancements to improve security of the application.
  • The application was patched, and configuration changes were made to mitigate the risk for this state agency as well as all other state agencies where the application was installed.
  • The application vendor had a more favorable view toward application security once they learned and understood the breadth of security risk that existed in the application.

Related Posts

Security Testing 2 min read
What Is Penetration Testing? Read More
Security Testing 5 min read
Red Teaming vs. Penetration Testing
Read More
Security Testing 10 min read
Penetration Testing versus Vulnerability Scanning: What's the Difference?
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.