Inside the Biggest U.S. Civilian Agencyβs Pentesting Strategy
The U.S. Department of Health and Human Services (HHS) draws on Synackβs trusted security researchers and smart pentesting platform to stay nimble in the face of fast-moving cyberthreats.Β
With 84,000 federal employees, the agencyβs sheer size poses challenges when it comes to addressing the cyber talent gap or pentesting its most critical networks. Itβs the largest U.S. civilian agency by spending.
βWe have an enormous footprint on the internet,β said Matthew Shallbetter, director of security design and innovation at HHS, during a webinar Wednesday hosted by Synack. βAcross the board, HHS is both vast and well-known β and so a good target for troublemakers and hackers.βΒ
He cited constant cyberthreats to the National Institutes of Health, HealthCare.gov and the Centers for Disease Control and Prevention β some of the most recognizable federal research centers and government services. All those resources fall under HHSβs purview.
So how does the agency hire for mission-critical cybersecurity roles, stay on top of shifting zero-trust requirements and satisfy the need for continuous security testing?
Shallbetter shared his insights with Synackβs Scott Ormiston, a federal solutions architect whoβs no stranger to the challenges facing public sector organizations globally.
With an estimated 2.72 million unfilled cybersecurity jobs worldwide, government agencies are struggling more than ever to meet diverse infosec hiring needs.Β Β
βAttackers are responding so much faster today than they were even five years ago,β Ormiston pointed out. βIn the time that a vulnerability is released to the public, within minutes of that release, attackers are out scanning your systems. If you donβt have enough skilled personnel to run a continuous testing program and to continuously be looking at your assets, how do you address that challenge?β
Here are a few themes and highlights from the webinar:
Continuous pentesting is a must
It can take weeks to spin up a traditional pentest to find and fix urgent software bugs. Meanwhile, bad actors almost immediately start scanning to exploit those same vulnerabilities, whether theyβre blockbuster flaws like Log4j or lesser-known CVEs.
Against that backdrop, traditional pentesting clearly falls short. But is continuous pentesting realistic?
βThe short answer is yes, because your adversaries are doing it every day: Theyβre continuously testing your environment,β Ormiston said.
Shallbetter noted that HHS has its own set of pentesting teams that are centrally located and focus on high-value assets. But there isnβt enough in-house talent to keep up with regular testing, scanning and patching.
βIf we could focus on whatβs really, really important and test those [assets], we might have enough bodies,β he said. βBut itβs really a challenge to try to patch vulnerabilitiesβ¦ The footprint never shrinks; itβs always expanding.βΒ
To augment his own agencyβs workforce capabilities, Shallbetter pulls from Synackβs community of world-class researchers. The diverse members of the Synack Red Team (SRT) allow HHS security testing to keep up with rapid software development cycles and the unrelenting pace of digital transformation.
HHS led 196 assessments using Synackβs platform, adding up to over 45,000 hours of testing on its perimeter services as part of an established vulnerability disclosure process.
Thereβs no match for human insight
That adds up to a lot of actionable data.
βWe really couldnβt have done the VDP the way we didβ¦ without using a centralized platform like Synack,β Shallbetter said. βThe human insight was key.β
He pointed out that HHS has automated tools across the board to help developers weed out vulnerabilities and drive down risk.Β Β
But over and over, SRT members would find more.
Shallbetter said his favorite examples are when a system owner engages the Synack Platform to validate that HHS has really fixed a vulnerability. βThey ask for a retest and the researcher says, βOh, I did X, Y, and Z, but I did it againβ¦β And the system owner says, βWow, thatβs really cool.ββ
Those exchanges also build trust between the SRT community and HHS developers who appreciate researchersβ ability to find the vulnerabilities that matter, cutting through the background noise of automation. An average of 30 SRT members contribute their expertise to each HHS assessment, according to Shallbetter.
βWhen you put a bunch of humans on a target, even if itβs been scanned and pentested by an automated tool, you will find new problems and new issues,β he said.
Zero trust is no longer just a buzzword
The White House early this year unveiled its highly anticipated zero trust strategy, M-22-09, which set federal agencies on a path to achieve a slate of zero-trust principles.
Those five security pillars include identity, devices, applications and workloads, networks and data.
βItβs great to have this architecture,β Ormiston said of M-22-09. βBut this also means additional stress on a cyber workforce thatβs under pressure.β
Zero trust is a βhot topicβ at HHS, as Shallbetter noted.
βIt doesnβt feel like a marketing term; people are really beginning to understand what it means and how to implement it in certain ways,β he said.
And pentesting has emerged as βa significant partβ of meeting HHSβs zero trust goals.Β
βI do think the scope and scale of technology now means the real vision for zero trust is possible,β he said. βFor HHS, penetration testing has been an important part of speeding our deployment processes.β
Agencies have until the end of fiscal 2024 to reach the pillars of the zero trust paradigm described in the White House memo.
In the meantime, Synack will continue working as a trusted partner with HHS, delivering on-demand security expertise and a premier pentesting experience.
βI love being able to sort of toss the schedule over the fence and say, βhey, Synack, we need four more [assessments], what are we going to do?ββand have it happen,β Shallbetter said.
Access the recording of the webinar here. To learn more about why the public sector deserves a better way to pentest, click here or schedule a demo with Synack here.
The post Inside the Biggest U.S. Civilian Agencyβs Pentesting Strategy appeared first on Synack.