APT (Advanced Persistent Threat)

Mon, 09/07/2015 - 10:41 -- pottol

Introduction to APT

APT Assessment

 APT changes the approach of currently performing Security Assessment. Indeed, the way of conducting such an analysis changed over the time:

  • In '80s and '90s, it was based on VA and PT, mainly; making use of trusted methodology, like OSSTMM.
  • In '00s, when the Web 2.0 was introduced, Web Application PT should be addedd, adopting OWASP Testing Guide
  • In '10s,  APT become pervasive, also the Threat Assessment should be count in.

In order to forecast the effects of APT exploit in a company infrastructure, an assessment based solely on vulnerabilities (wheather TCP-IP, HTML, etc) residing in server systems (a few, in numbers) is not sufficient. The clients (many) are now addressed. 

In order to make countermeasures manageable, a proper threat assessment should be conducted. Here a White Paper from Gartner "Threat Assessment in the Age of the APT:

https://www.gartner.com/doc/2738617/threat-assessment-age-apt

APT Detection