GCP Penetration Testing Best Practices and Its Importance - CYBRI

GCP Penetration Testing Best Practices and Its Importance

|

BY Paul Kubler

Why is Google Cloud Penetration Testing Important?

Google cloud pen testing is a critical work stream for organizations considering cloud deployment. Pen testing is a fundamental part of any security program. For pen testing to be a value to the organization, it needs to be relevant and with a purpose in mind. Testing just to test is both a waste of resources and capital.

Cloud environments separate common services or better known as the control plane. Data, however, Google segmented by client. Testing the control plane is not allowed within Google cloud.

The importance of google cloud pen testing is not limited in scope; however, here are few more points to consider when defining a Google Cloud test:

  • When performing a Cloud pen test with the tenants project or VPC, the tenant is not required to notify Google.
  • Google states tests should only affect the tester’s application or VPC, not other users or services. Google also has a Vulnerability Rewards Program to recognize the help of security researchers and professionals who find weaknesses in Google applications.
  • Tenants need to follow the Cloud Platform Acceptable Use Policy ensuring that their tests only impact their projects or VPCs.
  • Identify security vulnerabilities specific to the tenants’ VPC or project. 
  • Identify broken access controls entering and departing the VPC.

Google Cloud Platform Provides World Class Security, so Why Do I Need to Worry About Securing my Instance?

With Google Cloud Platform, your projects take advantage of the same security model that Google uses to keep its customers safe on other Google properties. However, if your instance becomes configured incorrectly, it could be vulnerable to an attack. 

Is Google Cloud secure enough?

Google, compared to AWS and Microsoft, has a very strong technical and security advantage in the data center space. Google architects and builds their data centers with custom-designed servers, running their in-house operating system.  Google developed their cloud platform from scratch including many services including kubernetes. The actual source code and custom cloud operating system, along with the storage algorithms, are not available outside of Google. By developing an entire in-house closed loop system, this gives Google an immense advantage over the cloud providers. Only Google knows when if their source code is vulnerable and what impact this could have on their tenants. AWS used similar in-house applications for their cloud offering, however Google has several years’ advantage in both experience and proven global stability. 

What Should I Do if my Google I Have Compromised a Cloud Project?

As an owner of a project or tenant with a VPC, you secure the software installed on your virtual machine. The following steps will help with limiting the damage:

  • Stop the instance immediately.
  • Notify impacted users; they might wonder why your service is down.
  • Identify the source of the vulnerability by analyzing the behavior of your instance and the software you’ve installed.
  • Ensure that all the software is up to date.

What are the Various Pen Tests Available Through 3rd Party Providers Against a Google VPC?

There are several pen testing strategies that tenants can engage with a 3rd party firm. Each method of engagement comes at a cost and a variable level of complexity. Pen testing should not be a one time box checking activity. Specifically, to a Google cloud deployment, a pen test should apply to the application and level of privacy and compliance of the data. Most times, pen tests become part of the post Cloud remediation work stream.

1. Black Box Penetration Testing

Black box penetration testing is a human and technical attack engagement in which the cloud testers do not have authenticated access to your cloud systems. With black-box penetration testing, cloud penetration testers must work only with the information they can find online or through possibly social engineering. Black box testing often is the most comprehensive engagement. This engagement, specific to Google, could range from testing Gmail instances, projects, or a specific VPC hosting application. 

2. White Box Penetration Testing

White box pen testing is a type which grants the white box tester admin-level access to google cloud systems or they have full knowledge of the systems. Most times, the tester team will interview the DEVOPS and SECOPS teams, along with application teams well ahead of the engagement. Most often, the white box tester team will offer post remediation pen test engagements.

3. Gray Box Penetration Testing

A gray box penetration test uses methods from both white box and black box pen testing. This engagement simulates an attack by internal cloud users having limited access to the google cloud. This is an excellent engagement to test if the simulated hacker is internal within the organization.

What is Discovered During a Pen Test Against Google VPCs?

Misconfigured In-bound ports

Inbound ports are also one of the major controls of GCP that need to be tested. The most important inbound ports need to be secured by the VPC firewall rules include SSH, web, and FTP traffic.  

Why is Google Cloud Penetration Testing important?

Google cloud began as a consumer product, not enterprise or service provider. The origins of their platform did not include several enterprise or government level security controls like FEDRAMP and ISO27001. These compliance frameworks became added years later. Even with billions of dollars invested along with having 500+ engineers worldwide, Google still lacks similar enterprise expertise that Microsoft Azure and Amazon web services have today. Google is making major head roads in the local and state government markets through having a secured cloud offering and compliance services. Tenants of Google still should incorporate 3rd party pen testing against their Google projects and VPC. Real-life exploitation of security risks and vulnerabilities will exist in some form within the Google cloud. Having an independent 3rd party test team engage with your organization will ensure the highest level of objectivity and experience in validating the security within your Google instance.

Discuss your project now

Related Content

Previous
Next

Schedule a personalized demo with CYBRI.

Don't wait, reputation damages & data breaches could be costly.

Tell us a little about your company so we can ensure your demo is as relevant as possible. We’ll take the scheduling from there!
Michael B.
Michael B.Managing Partner, Barasch & McGarry
Read More
I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
Tim O.
Tim O.CEO at Cylera
Read More
I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
Sergio V.
Sergio V.CTO at HealthCare.com
Read More
I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
L.D. Salmanson
L.D. SalmansonCEO at Cherre.com
Read More
We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
Marco Huslmann
Marco HuslmannCTO MyPostcard
Read More
CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
Alex Rothberg
Alex RothbergCTO IntusCare
Read More
I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
John Tambuting
John TambutingCTO Pangea.app
Read More
I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
Previous
Next

Discuss your Project







    Michael B.
    Michael B.Managing Partner, Barasch & McGarry
    Read More
    I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
    Tim O.
    Tim O.CEO at Cylera
    Read More
    I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
    Sergio V.
    Sergio V.CTO at HealthCare.com
    Read More
    I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
    L.D. Salmanson
    L.D. SalmansonCEO at Cherre.com
    Read More
    We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
    Marco Huslmann
    Marco HuslmannCTO MyPostcard
    Read More
    CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
    Alex Rothberg
    Alex RothbergCTO IntusCare
    Read More
    I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
    John Tambuting
    John TambutingCTO Pangea.app
    Read More
    I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
    Previous
    Next

    Find mission-critical vulnerabilities before hackers do.

    CYBRI’s manual pen tests are performed by U.S.-based highly certified Red Team experts.

    We help businesses detect & remediate catastrophic vulnerabilities in applications, cloud, and networks.