Internal Vs External Vulnerability Scans

Contents

An internal vulnerability scan is performed typically with access to the internal network, with the main benefit of identifying at-risk systems while providing insight for patch management processes.

An external scan is performed outside of a network and targets specific IP addresses to identify vulnerabilities.

An external scan can also detect open ports and protocols, similar to an external penetration test. Both application and network scans not only detect vulnerabilities but may check for compliance against several different baselines.

Free IT Security Policies

Get a step ahead of your goals with our comprehensive templates.

IT Security Policy Templates
Internal VS External Vulnerability Scans

What Is An Internal Vulnerability Scan?

Internal vulnerability scans are performed from a location that has access to the internal network you are scanning. These scans show vulnerabilities at a greater depth as they can see more of the network compared to an external scan.

Internal scans are best used when you need to verify patching has occurred, or when you need to provide a detailed report of vulnerabilities in the network.

Read MoreHow To Develop & Implement A Network Security Plan

Credentialed VS Uncredentialed Scans

When thinking about internal vulnerability scans, you may wonder why you would even consider running an uncredentialed scan.

Wouldn’t credentialed scans provide more information?

Well, the answer is yes AND no.

While credentialed scans provider a better and deeper understanding of what vulnerabilities exist to an outsider attempting to exploit a known vulnerability via a malicious download or phishing attempt, we need to realize that not all attacks come from the outside in.

Credentialed vs uncredentialed scans

With technology becoming more readily available and easier to use for non-technical users, the risk of an insider attack has never been more real.

Non-credentialed scans simulate what type of information an insider, without privileged access, can gain about the security posture of your network.

While this type of scan may not seem useful, do not dismiss it. You may be surprised to see what a regular user can learn about the network or what information they might have access to that they shouldn’t.

What Is An External Vulnerability Scan?

External vulnerability scans are performed from outside of the network you are testing. These scans are targeted at external IP addresses of your network. The type of information you will find useful in these scans are not only the vulnerabilities but the list of ports that are open to the internet.

External scans are best used when you need to verify the strength of your externally facing services.

External scanning, much like internal scanning, has many benefits. Again, you are taking a proactive approach to protect your network by performing these scans. External scans show weaknesses in your network that could lead to a potential incident.

By looking at your network from this view, you can easily identify what that most pressing issue is within your network. You can also identify any services or new servers that have been set up since the last scan and identify if they present any new threats to your organization.

Next Steps After Performing A Vulnerability Scan

After performing your scans, it is important to act on them. Often times these scans are run with no analysis performed on the backend. Analysis should occur in a format that makes sense to the company and in a way that minimizes the possibility of overlooking a potential threat.

I have seen analysis occur by manually reviewing the results and by having an automated process for reporting on the top missing patches. Either way, there should be some type of action to take away from each scan.

The ultimate goal of vulnerability scans is to provide insight so you may improve the overall security posture for your company. Scanning should be a step that is built into your patch management and risk management processes. Each scan should be reviewed for concerning patches and the remediation efforts should be discussed and approved with IT management.

Determining what to look for in scans really depends on the company and what their approach is to security. Do not get blindsided by the risk ratings most tools provide though.

A vulnerability assessment risk matrix is often used to visually represent scan results in an easily understood and digestible format for all stakeholders within an organization. This includes security teams, IT staff, finance, operations, and executive leadership.

cyber security risk assessment matrix

Although there may be a number of high and medium vulnerabilities, take your time and review the low and information vulnerabilities as well. In my experience, I have found low and informational vulnerabilities that showed remote desktop services and unencrypted file transfer services accepting requests over the internet.

Vulnerability Scans And Risk Assessments

As previously mentioned, vulnerability scans are part of a risk assessment.

Vulnerability assessments are conducted when required by regulatory compliance, like HIPAA or PCI, or by request from company leadership to better understand their risk posture.

While performing a risk assessment, vulnerability scans are often one of the first things done to gain a better understanding of the network and the company’s stance on security. By performing these types of scans you are provided an almost instant report of the security posture of your network.

Purplesec network vulnerability assessment report

Risk assessments, coupled with vulnerability scans, provide companies with a road map of what they should either be doing or continue doing, to strengthen their security posture.

Article by

Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.

Related Content

Picture of Jason Firch, MBA
Jason Firch, MBA
Jason is a proven marketing leader, veteran IT operations manager, and cybersecurity expert with over a decade of experience. He is the founder and CEO of PurpleSec.

Share This Article

Our Editorial Process

Our content goes through a rigorous approval process which is reviewed by cybersecurity experts – ensuring the quality and accuracy of information published.

Categories

.

$50/mo per device

Managed XDR Built For Small Business

Subscribe to easy cybersecurity and save thousands with a cloud-native managed detection and automated response solution.