I’m always stumpified to learn when security programs rely almost exclusively on automated compliance and vulnerability scanning to assess the technical security aspects of an integrated system. Compliance and vulnerability scans are extremely important as a foundation for the security program, but the scan results should not be used as the only measurement for the risk posture. Scanning tools can examine common operating systems and popular applications, but they can’t scan all security-enabled components since security criteria is not yet defined by vendors for every product on market, including many popular products… and they definitely don’t perform functional testing to verify the behavior of the fully integrated infrastructure.
How secure are the multitude of components within the infrastructure that can’t be scanned? Do you know the prevalence of the log4j vulnerability and how simple it can be exploited? Do all interconnected system components operate as expected?… you might be surprised to learn security features do not operate as expected during testing. Here’s some examples to consider that an in-depth security assessment might discover:
Programs should always make an investment to examine components not covered by automated tools and perform some level of functional testing to assess the security features and determine the actual risk posture of system/network infrastructure.