{"id":9003,"date":"2024-09-03T22:46:09","date_gmt":"2024-09-03T17:16:09","guid":{"rendered":"https:\/\/www.satup.xyz\/index.php\/2024\/09\/03\/adobe-security-testing-reports-expanding-and-evolving-penetration-testing-to-combat-adversarial-interests-by-renae-kang-sep-2024\/"},"modified":"2024-09-03T22:46:09","modified_gmt":"2024-09-03T17:16:09","slug":"adobe-security-testing-reports-expanding-and-evolving-penetration-testing-to-combat-adversarial-interests-by-renae-kang-sep-2024","status":"publish","type":"post","link":"https:\/\/www.satup.xyz\/index.php\/2024\/09\/03\/adobe-security-testing-reports-expanding-and-evolving-penetration-testing-to-combat-adversarial-interests-by-renae-kang-sep-2024\/","title":{"rendered":"Adobe Security Testing Reports: Expanding and Evolving Penetration Testing to Combat Adversarial Interests | by Renae Kang | Sep, 2024"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div>\n<div>\n<h2 id=\"dbbb\" class=\"pw-subtitle-paragraph hr gt gu bf b hs ht hu hv hw hx hy hz ia ib ic id ie if ig cq du\">By <a class=\"af ih\" href=\"https:\/\/www.linkedin.com\/in\/danapirvu\/\" rel=\"noopener ugc nofollow\" target=\"_blank\">Dana Pirvu<\/a>, Manager, Penetration Testing, Adobe<\/h2>\n<div>\n<div class=\"speechify-ignore ab cp\">\n<div class=\"speechify-ignore bh l\">\n<div class=\"ii ij ik il im ab\">\n<div>\n<div class=\"ab in\"><a href=\"https:\/\/medium.com\/@renaekang97?source=post_page-----540987d039e5--------------------------------\" rel=\"noopener follow\"><\/p>\n<div>\n<div class=\"bm\" aria-hidden=\"false\">\n<div class=\"l io ip by iq ir\">\n<div class=\"l fj\"><img loading=\"lazy\" decoding=\"async\" alt=\"Renae Kang\" class=\"l fd by dd de cx\" src=\"https:\/\/miro.medium.com\/v2\/resize:fill:88:88\/1*_2c2rNBYDHH7262294wRcA.jpeg\" width=\"44\" height=\"44\" loading=\"lazy\" data-testid=\"authorPhoto\"\/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/a><a href=\"https:\/\/blog.developer.adobe.com\/?source=post_page-----540987d039e5--------------------------------\" rel=\"noopener  ugc nofollow\"><\/p>\n<div class=\"iu ab fj\">\n<div>\n<div class=\"bm\" aria-hidden=\"false\">\n<div class=\"l iv iw by iq ix\">\n<div class=\"l fj\"><img loading=\"lazy\" decoding=\"async\" alt=\"Adobe Tech Blog\" class=\"l fd by br iy cx\" src=\"https:\/\/miro.medium.com\/v2\/resize:fill:48:48\/1*riyFijvwTfGcWNf1guRNtg.png\" width=\"24\" height=\"24\" loading=\"lazy\" data-testid=\"publicationPhoto\"\/><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<figure class=\"nm nn no np nq nr nj nk paragraph-image\">\n<div role=\"button\" tabindex=\"0\" class=\"ns nt fj nu bh nv\">\n<div class=\"nj nk nl\"><picture><source srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/format:webp\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/format:webp\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/format:webp\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/format:webp\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/format:webp\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/format:webp\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/format:webp\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\" type=\"image\/webp\"\/><source data-testid=\"og\" srcset=\"https:\/\/miro.medium.com\/v2\/resize:fit:640\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 640w, https:\/\/miro.medium.com\/v2\/resize:fit:720\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 720w, https:\/\/miro.medium.com\/v2\/resize:fit:750\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 750w, https:\/\/miro.medium.com\/v2\/resize:fit:786\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 786w, https:\/\/miro.medium.com\/v2\/resize:fit:828\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 828w, https:\/\/miro.medium.com\/v2\/resize:fit:1100\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 1100w, https:\/\/miro.medium.com\/v2\/resize:fit:1400\/1*YPSwB6aTifed0IM1JBuTXg.jpeg 1400w\" sizes=\"(min-resolution: 4dppx) and (max-width: 700px) 50vw, (-webkit-min-device-pixel-ratio: 4) and (max-width: 700px) 50vw, (min-resolution: 3dppx) and (max-width: 700px) 67vw, (-webkit-min-device-pixel-ratio: 3) and (max-width: 700px) 65vw, (min-resolution: 2.5dppx) and (max-width: 700px) 80vw, (-webkit-min-device-pixel-ratio: 2.5) and (max-width: 700px) 80vw, (min-resolution: 2dppx) and (max-width: 700px) 100vw, (-webkit-min-device-pixel-ratio: 2) and (max-width: 700px) 100vw, 700px\"\/><img fetchpriority=\"high\" alt=\"\" class=\"bh mq nw c\" width=\"700\" height=\"400\" loading=\"eager\" role=\"presentation\"\/><\/picture><\/div>\n<\/div><figcaption class=\"nx ff ny nj nk nz oa bf b bg z du\">Generated with <a class=\"af ih\" href=\"https:\/\/www.adobe.com\/products\/firefly.html\" rel=\"noopener ugc nofollow\" target=\"_blank\">Adobe Firefly<\/a>.<\/figcaption><\/figure>\n<p id=\"9994\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">As adoption of generative AI (GenAI) continues to grow, adversarial interest in compromising the security posture of all applications and services \u2014 whether they leverage GenAI or not \u2014 is increasing as well. Companies that develop and deliver the complex software on which so much of the world\u2019s economy depends must focus their efforts on defending against these attacks.<\/p>\n<p id=\"404c\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">At Adobe, we believe the best way to measure the security posture of a product is by thinking like an adversary. That\u2019s why we\u2019ve incorporated this tenet into the foundation of the <a class=\"af ih\" href=\"https:\/\/www.adobe.com\/content\/dam\/cc\/en\/trust-center\/ungated\/whitepapers\/corporate\/adobe-security-testing-reports-overview.pdf\" rel=\"noopener ugc nofollow\" target=\"_blank\">Adobe Security Testing Reports<\/a>, where we rigorously test each of our products from an adversary-aware perspective and measure them against proven, exploitable threats. The resulting product-specific reports provide a transparent view into the wide range of security testing Adobe conducts, which helps us build trust with our customers and partners. In this blog, I will explain how Adobe puts together our annual Security Testing Reports.<\/p>\n<p id=\"5aa2\" class=\"pw-post-body-paragraph ob oc gu od b hs pt of og hv pu oi oj ok pv om on oo pw oq or os px ou ov ow gn bk\">Adobe\u2019s annual security testing regime includes five (5) different types of tests:<\/p>\n<ul class=\"\">\n<li id=\"6b8c\" class=\"ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow py pz qa bk\"><strong class=\"od gv\">Outsourced (or Third-Party) Penetration Testing: <\/strong>Bypassing user access control restrictions and\/or gaining privileged access to infrastructure through exploitation of applications and network-related vulnerabilities from an adversarial perspective, outsourced pen tests are externally facing from outside Adobe\u2019s network and provide an objective view of Adobe products\u2019 security posture.<\/li>\n<li id=\"03af\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Internal Penetration Testing:<\/strong> Employing manual testing techniques and automated tools to evaluate internal systems, applications, and networks, internal pen tests are performed in a staged environment inside Adobe\u2019s network and simulate real-world attacks to measure the effectiveness of existing security measures;<\/li>\n<li id=\"f559\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Red Team Testing:<\/strong> Challenging our security teams\u2019 cyber defenses using customized toolkits, <a class=\"af ih\" rel=\"noopener ugc nofollow\" target=\"_blank\" href=\"https:\/\/blog.developer.adobe.com\/cybersecurity-red-teaming-when-assumptions-arent-enough-d3666a61b660\">Adobe Security\u2019s Red Team<\/a> employs offensive techniques to evaluate our preparedness to defend against various real-world adversaries;<\/li>\n<li id=\"ec2a\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Bug Bounty: <\/strong>Collaborating with a global community of external security researchers and ethical hackers helps Adobe provide an extra layer of protection to customers by finding and reporting undiscovered vulnerabilities to our product security teams before real-world adversaries can exploit them.<\/li>\n<li id=\"4e38\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Customer Penetration Testing:<\/strong> In some exceptional circumstances, Adobe is able to accommodate customer-led penetration testing. Any findings uncovered from these tests provide an extra input to our security teams.<\/li>\n<\/ul>\n<p id=\"3823\" class=\"pw-post-body-paragraph ob oc gu od b hs pt of og hv pu oi oj ok pv om on oo pw oq or os px ou ov ow gn bk\"><a class=\"af ih\" href=\"https:\/\/www.adobe.com\/content\/dam\/cc\/en\/trust-center\/ungated\/whitepapers\/corporate\/adobe-security-testing-reports-overview.pdf\" rel=\"noopener ugc nofollow\" target=\"_blank\">Adobe Security Testing Reports<\/a> help achieve consistency in testing across our products, including those with GenAI features, by using the same methodologies, guidelines, industry standards, and best practices to test all products. Adobe then does not publish the results of the Security Testing Reports until all identified vulnerabilities have been addressed and either fixed or mitigated.<\/p>\n<p id=\"809e\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">In addition to the independent, third-party testing firm\u2019s attestation, each Adobe Security Testing Report also includes:<\/p>\n<ul class=\"\">\n<li id=\"5168\" class=\"ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow py pz qa bk\"><strong class=\"od gv\">Testing Scope:<\/strong> Specifies the solution components included in the assessment.<\/li>\n<li id=\"d578\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Testing Approach:<\/strong> Outlines the methodology, guidelines, industry standards and best practices followed, including frameworks like the Open Worldwide Application Security Project (OWASP) Top 10 or the SysAdmin, Audit, Network, and Security (SANS) Top 25 to identify critical vulnerabilities.<\/li>\n<li id=\"8519\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Testing Methodology:<\/strong> Describes the assessment techniques and methodology followed, such as black-box testing or grey-box testing with source code review.<\/li>\n<li id=\"c682\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Test Results<\/strong>: Summarizes the vulnerabilities identified during the testing process.<\/li>\n<li id=\"4fb6\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Finding Summaries<\/strong>: Lists the exploitable vulnerabilities discovered during the assessment.<\/li>\n<li id=\"3641\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Finding Resolution<\/strong>: Provides the status of each identified vulnerability, such as whether it has been fixed or mitigated.<\/li>\n<li id=\"dfa3\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Finding Severity<\/strong>: Assigns a risk rating to each vulnerability based on CVSS 3.1 scoring.<\/li>\n<li id=\"de97\" class=\"ob oc gu od b hs qb of og hv qc oi oj ok qd om on oo qe oq or os qf ou ov ow py pz qa bk\"><strong class=\"od gv\">Security Testing Categories<\/strong>: Details the defined policies, standards, and solutions, along with specific tests designed to achieve control adherence and resilience.<\/li>\n<\/ul>\n<p id=\"4af5\" class=\"pw-post-body-paragraph ob oc gu od b hs pt of og hv pu oi oj ok pv om on oo pw oq or os px ou ov ow gn bk\">Adobe views the Adobe Security Testing Reports as an ever-evolving source of customer trust, which is why we continuously work to improve both their content and transparency. One example of these improvements is the expansion of the outsourced pen testing component. Earlier this year, we expanded our testing methodology to include a hybrid testing approach, combining \u201cGrey Box\u201d as well as \u201cAuthenticated Black Box\u201d testing. Grey-box or source code-assisted tests involve sharing detailed information with testers, such as functionality documentation, user roles, and source code, to ensure a thorough assessment. In authenticated black-box testing, testers are provided with a full list of externally facing URLs\/domains and testing credentials to evaluate the application\u2019s security. This addition enables us to conduct comprehensive third-party testing that uses a hybrid testing methodology to verify both test coverage and completeness.<\/p>\n<p id=\"6987\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">We base our improvements for the Security Testing Reports not only on new threats and updated industry best practices, but also on feedback we receive directly from customers and stakeholders. In the most recent iteration, we incorporated customer-recommended features, including the severity rating and testing source for each finding, as well as a list of all testing sources included in the report.<\/p>\n<p id=\"dca9\" class=\"pw-post-body-paragraph ob oc gu od b hs pt of og hv pu oi oj ok pv om on oo pw oq or os px ou ov ow gn bk\">The Adobe Security Testing Reports are instrumental in helping our customers meet their own internal compliance and regulatory efforts. We often receive feedback that these reports have been valuable supplementary documentation that help customers assess Adobe\u2019s offerings against their own security requirements for application and network testing. Those customers operating in highly regulated industries have been at the forefront of this feedback as a beneficiary of Adobe\u2019s investment in developing comprehensive testing reports alongside other formal certifications found in the <a class=\"af ih\" href=\"https:\/\/www.adobe.com\/trust\/resources.html\" rel=\"noopener ugc nofollow\" target=\"_blank\">Adobe Trust Center<\/a>.<\/p>\n<p id=\"3468\" class=\"pw-post-body-paragraph ob oc gu od b hs oe of og hv oh oi oj ok ol om on oo op oq or os ot ou ov ow gn bk\">More importantly, the Adobe Security Testing Reports also play a crucial role in providing our customers with enhanced visibility into our testing capabilities and the efforts we implement to ensure that our products are as resilient and secure as possible against adversarial attacks. We believe that providing this level of transparency enhances the trust our customers place in us, and we will continue to refine and expand these efforts to uphold our commitment to create safer digital experiences for all.<\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/blog.developer.adobe.com\/adobe-security-testing-reports-expanding-and-evolving-penetration-testing-to-combat-adversarial-540987d039e5?source=rss----9342990108af---4\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Dana Pirvu, Manager, Penetration Testing, Adobe Generated with Adobe Firefly. As adoption of generative AI (GenAI) continues to grow, adversarial interest in compromising the security posture of all applications and services \u2014 whether they leverage GenAI or not \u2014 is increasing as well. Companies that develop and deliver the complex software on which so [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9004,"comment_status":"","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[19],"tags":[],"class_list":["post-9003","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-graphics-design"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/9003","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/comments?post=9003"}],"version-history":[{"count":0,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/posts\/9003\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media\/9004"}],"wp:attachment":[{"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/media?parent=9003"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/categories?post=9003"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.satup.xyz\/index.php\/wp-json\/wp\/v2\/tags?post=9003"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}