Synack Platform Guide
Synack Platform Guide
Synack Security
Testing Platform
How to use one platform for all of your penetration testing needs
1
Table of Contents
Introduction 3
Vulnerability Management 15
Testing Controls 19
Conclusion 25
2
Introduction
Imagine a world where your security testing is the strategic arm of
your security program, helping to illustrate actionable data from your
attack surface and guide your security team through comprehensive
remediation of exploitable vulnerabilities without adding layers to your
security stack.
Compliance checklists are a good place to start, but they won’t deliver
the insights you need to protect your organization in the long term. And it
won’t protect your organization from reputational damage and potential
fines if a breach occurs. Today’s security landscape requires continuous
oversight of your most protected assets and the ability to identify
security trends across the organization.
3
Why security testing needs to improve
Testing once a year doesn’t address a software development lifecycle that introduces
new code daily, and current testing methodologies often treat all assets the same
despite a varied level of risk. Finally, most firms don’t take action on results because
the quality, visibility and consistency of the vulnerability reports are poor.
Security leaders can no longer rely on traditional pentesting that creates noise, doesn’t
scale and results in only some, not all, exploitable vulnerabilities being fixed to check
the compliance box. It’s time to embrace a security culture that is risk-driven instead
of compliance-driven.
A CISO PERSPECTIVE
Taking a thoughtful approach to security testing based on asset-level risk can help your
organization craft a testing strategy that will not only keep you compliant, but also help you
to properly manage risk across a growing attack surface. The spectrum of testing the Synack
Platform supports includes everything from continuous pentesting to automated vulnerability
scanning. Increasingly, companies are moving away from a one-size-fits-all approach to their
attack surface and want flexibility in their security testing consumption. Companies need
choices and the ability to test assets when they want, where they want and how they want.
4
Developing
an ideal security Continuous Continuous Targeted On-Demand Automated
testing strategy
Testing Testing Penetration Security Vulnerability
365 days 90 days Testing Tasks Scanning
LOW
HIGH
ASSET IMPORTANCE
Tactical
Identify exploitable
+ Strategic
Identify root cause to stop
vulnerabilities creating vulnerabilities
so they can be fixed that could be avoided
5
Benefits of the Synack
Security Testing Platform
This guide will provide an overview of the Synack Platform technology
pillars including asset discovery and insights, vulnerability management,
operations and support, the Synack API and integrations, reporting and
real-time analytics, testing controls and managed community access.
Before summarizing these pillars, we’ll review how these pillars can benefit
your organization from a test efficacy perspective.
6
Discover, inventory and prioritize
new assets
Synack provides continuous discovery of new web, IP and FQDN assets to help
keep your asset inventory updated. Discovered assets will appear in the client
portal alongside any assets you have tested; additionally, assets are fingerprinted.
Investigate and prioritize assets for further pentesting by learning about their
testing status, open ports and suspected or exploitable vulnerabilities.
7
Do more testing without
compromising on quality
Every year, Synack scales to meet the evolving landscape of exploitable
vulnerabilities and the increasing size of enterprise attack surfaces.
Synack provides a consistent and secure global experience for every test
from start to finish.
CVEs in 2023
Moderate
has enterprise grade
security controls
8
Find root causes of vulnerabilities
With the platform, you can see security trends across vulnerabilities, identify root causes
and materially improve your security posture. For example, one Synack customer learned
that 80% of vulnerabilities found in applications and infrastructure were related to
authentication. After they built an internal education program to retrain their teams on
secure authentication, they cut their authentication vulnerability rate in half.
9
Pillars of the
Synack Platform
Synack provides a transformative security testing experience with you in mind.
How? We’ll review the core technology components of the Synack Platform
and how they correlate to benefits for your team. The pillars of the platform
discussed in following sections include:
10
Asset Discovery and Insights
1 The first step for a security testing program is assembling an accurate inventory
of assets. In today’s environment, attack surfaces are dynamic and software
development is continuous. Synack helps security teams stay proactive with
continuous attack surface discovery to inform their strategic security testing plans.
Self-service discovery
Easily add your known Domains, FQDNs, IPv4 addresses, CIDRs and IP ranges to
a seed group and launch a scan at the click of a button to discover new assets.
11
Continuous discovery of new assets
Synack provides continuous discovery of new assets in a single dashboard with
filters to help prioritize by asset type and confirmation status. Tested assets will
also appear in the Discovered Assets view and be confirmed automatically.
Asset Insights
Once assets are confirmed, they will appear in the Asset List for further
fingerprinting and investigation. For more details about Asset Insights view here.
12
Managed Community Access
2 Access to a community of security researchers you can’t hire or find.
Easily launch dozens of structured security tests on-demand.
Researcher vetting
Five-step vetting process including background checks,
skill assessment and video interviews.
13
Researcher skills matched to your targets
SRT members only have access to targets where they have demonstrated skill
through technical assessments and proven ability to succeed.
Cross Site
Vulnerability Remote Code Session
SQL Injection Request Forgery Lateral Movement Privilege Escalation
Expertise Execution (RCE) Authentication
(XSRF)
Web
Offensive Remediation Malware Password Brute
Tools Development Application Reverse Engineering
Security Skills Guidance Analysis Force Testing
Testing
Offensive Security
Certifications CISSP GCIH ECES CCNP eMAPT
Certified (OSCP)
14
Vulnerability Management
3 Synack manages your journey from vulnerability discovery to remediation, so
your developers can address fixes earlier and you can rest assured that your
vulnerabilities are thoroughly addressed.
Recon
Vulnerability Management Cycle Steps
Recon Synack deploys SmartScan for pre-test scanning
Confirm Hunt
Unlimited users
No “per person” user charges to encourage secure and
appropriate access to testing data. Include developers with
access with role-based access control.
15
Key vulnerability management features
16
Operations and Support
4 Synack ensures that vulnerabilities are high impact and truly exploitable. Triage
eliminates any duplicate submissions or low-quality submissions. Additionally,
Synack provides customer support available 24/7 to scope and launch tests.
Customer Success
Customers are supported by trained customer success and support professionals.
Worldwide Team
Vulnerability reports reviewed by a team built to span multiple time zones, so they
are reviewed in a timely manner no matter your company’s global location.
Launch Assistance
Synack professionals help customers carefully prepare for each test, minimizing the
chance of surprises or errors.
Professional Triage
All reports are checked for accuracy and true exploitability before being sent to
customers. Duplicates are also removed.
Community Team
Dedicated Community Team at Synack advocates for, engages with, recognizes
and rewards top SRT members.
Recruitment
Synack never stops enlisting great talent to help serve customers with
specialized or fresh tactics, techniques and procedures.
17
API and Integrations
5 Integrating Synack into other security workflows and tools is important for reducing
operational friction, improving responsiveness, triaging and reducing alert noise and
validating security posture. Use cases for integration include process operations,
security operations, incident response and security analytics.
Synack Integrations
These are the existing pre-built integrations and modules by Synack.
Sample process operations integration between Synack and Jira Screenshot from Splunk app of Synack integration
18
Testing Controls
6 Achieve full control and visibility over all testing traffic. Easily audit all testing traffic
to spot trends, measure testing hours and ensure coverage of your attack surface.
Pause Assessment
A button on each assessment page allows
you to stop testing at any time.
Coverage Analytics
Synack leverages a testing traffic audit
trail to provide analytics on what domains,
subdomains, API endpoints and IPs have
been tested. Additionally, all researcher
and scanning hours are tracked to provide
a holistic view of attacker effort.
19
Reporting and Real-Time Analytics
7 Traditional pentest reports are descriptions of what was done during testing, what was
found and what might be done about it. Those reports result in a fossilized memento
of what was tested. Without responsive analytics and trend analysis, the report and
analytics are useful for just a moment in time without context of what happened
before or since.
Real-time analytics
Dashboard
Customer portal includes testing data at a glance,
including new findings, burndown charts, patch
verification and historical findings.
Coverage Analytics
Provides real-time views and reporting on what (e.g.
domains, subdomains, API endpoints), when and how
assets are tested (e.g. number of researchers, attack
types, hours of penetration testing).
Reports
Configurable, Flexible Reporting Vulnerability Reports
Synack provides customizable, compliance- Clear descriptions of found exploitable vulnerabilities,
ready reports suitable for business or technical including statistics, steps to reproduce, screenshots
audiences that encompass scope, testing and suggested patches
information, vulnerabilities and remediation status.
Best Practice Reports
Human-Written Summaries In addition to vulnerabilities, some Synack offerings
Tests come with summaries based on a security include weakness checks that can be easily shared
expert analysis of the testing data. with developers, operations, auditors or regulators to
confirm implemented best practices.
20
Managed Vulnerability
Disclosure Program
A vulnerability disclosure program (VDP) is a vital part of a strategic
security testing plan. Most organizations don’t have a process for
external security issue reporting, which creates expensive and
cumbersome internal workflows. A VDP program can help reduce noise
and keep incidents from escalating.
21
Key Features of the Synack Managed Vulnerability
Disclosure Program
Synack’s Managed Vulnerability Disclosure Program (MVDP) is included in the premium platform offering and
provides end-to-end management of your VDP program.
Vulnerability management
Synack handles all stages of vulnerability management
from initial discovery to patch verification.
22
Synack Catalog
and Credits
Use our catalog of security testing offerings and platform credits
model to build and execute a flexible testing program. Once you
identify your security goals using Synack’s risk-driven approach, you
can select from offerings such as continuous testing with Synack365,
OWASP and NIST vulnerability checklists, spot checks for CVEs like
Log4j and more.
23
The Synack Catalog: Align your security goals
We provide credits to launch on-demand security testing at any time through the
Synack Catalog, featuring vulnerability checklists, NIST checklists, individual CVE/
zero day tests and other targeted tasks to be performed by SRT researchers.
We can help you to rethink how your organization does security testing. By changing
your security testing methodology, centralizing and standardizing vulnerability reports
and creating a flexible security testing menu for customers, our platform can help
security teams improve test efficacy and leverage vulnerability data strategically.
2480 credits
Synack365 x2
Web Premium Checklist x1 1240 credits each
130 credits Synack90 x1 600 credits
x3 1800 credits
30 credits Synack90
Vuln checks x10 x1
600 credits each
3 credits each Synack14 240 credits
x3
720 credits
Synack14
240 credits each
Digital reconnaissance x1 150 credits
SolarWinds x1 10 credits
Microtest check
24
Conclusion
Flexibility, 24/7 Availability and Support—All in One
Capable. Confident. Synack delivers an industry-leading security testing experience for
our customers. We provide a range of point-in-time and continuous options for security
testing, depending on the risk of the asset. Once you’ve selected a testing strategy that
matches your organization’s security goals, you’ll see improvement in your security posture
with each deployed test. The Synack Platform consolidates results, so you can identify root
causes of vulnerabilities and plan strategically. The Synack Catalog also extends Synack’s
security testing capabilities into areas like digital reconnaissance, API security, and checks
for specific vulnerabilities such as SolarWinds or Log4j.
You will no longer have to guess where to focus your security testing efforts based on a
point-in-time, compliance-driven pentest. Instead, you can embrace an asset-based,
risk-driven approach that results in concrete improvement of your security posture,
improvement that you can effectively communicate to executives and board members.
25