
Why Multi-Factor Authentication is Not Enough
Knowing is half the battle, and the use and abuse of common frameworks shed insight into what defenders need to do to build defense in depth.
September 13, 2024 - Blog

Security teams know they need visibility into vulnerabilities. What’s less clear is how to get it.
Vulnerability scans provide a point-in-time view of weaknesses in your systems or applications. When used correctly, they help reduce exposure before attackers exploit it.
However, not all scans provide the same depth, and not all visibility leads to meaningful risk reduction, especially compared to penetration testing.
Let’s break down the two primary types of vulnerability scans (and why penetration testing yields more impactful results than either.)
Credentialed scanning uses administrative-level access to log into systems and inspect them from the inside.
Instead of looking only at exposed services, it evaluates:
Installed software
Patch levels
Configuration files
Privileged access risks
System-level misconfigurations
Credentialed scans provide a more accurate picture of your internal security posture. They identify issues that wouldn’t be visible from the outside, including privilege escalation paths and configuration drift.
Credentialed scans are ideal when:
You need a comprehensive vulnerability inventory
You want to verify patching and configuration controls
You are preparing for audits or compliance reviews
You want better prioritization based on actual exploitability
Uncredentialed scanning does not log into systems. Instead, it evaluates what is visible from a network or external perspective.
It answers an important question:
What can an attacker see without credentials?
Uncredentialed scans simulate an external attacker’s first look at your environment. They can quickly identify:
Open ports
Exposed services
Outdated public-facing software
Uncredentialed scans are ideal when:
You need a fast external exposure overview
You do not have administrative access
You are performing preliminary reconnaissance before deeper testing
Internal scans evaluate vulnerabilities within your network, focusing on insider threats or lateral movement.
External scans assess internet-facing exposure with an emphasis on outside attackers.
Both perspectives are important. Threat actors don’t limit themselves to one.
Intrusive scans actively interact with systems and may test exploitability. Non-intrusive scans passively gather information.
The right choice depends on business tolerance for impact and testing depth.
Environmental scans focus on specific assets, such as a single application, operating system, or network segment.
They’re helpful when you have defined risk areas or compliance requirements.
Scans can be powerful, but they don’t replicate how attackers think.
They detect known vulnerabilities. They do not:
Test how weaknesses chain together
Validate real-world exploitability
Simulate human adversaries.
That’s where penetration testing comes in.
Vulnerability scanning identifies potential weaknesses. Penetration testing proves which ones actually matter.
A scan might tell you:
“This service is outdated.”
A penetration test shows you:
“Here’s how that outdated service leads to domain compromise, data exfiltration, and business impact.”
Penetration testing is manual, adversary-driven, and contextual. It prioritizes risk based on exploitability vs. standardized severity ratings, and are often not enough to meet security standards or cyber insurance renewal expectations.
Relying only on scanning can create three dangerous gaps:
False Confidence: A clean scan does not mean you’re secure.
Missed Attack Paths: Scanners don’t chain vulnerabilities together.
Limited Context: CVSS scores don’t reflect your business risk.
Security leaders who combine credentialed scans, uncredentialed scans, and periodic penetration testing gain both coverage and realism.
Credentialed scans authenticate into systems using administrative credentials.
They:
Compare installed software against known vulnerability databases
Evaluate system configurations
Identify missing patches
Detect privilege-related weaknesses
Because they inspect systems directly, they often reduce false positives and improve remediation prioritization.
However, they still rely on vulnerability signatures, not adversarial creativity.
False positives can occur when scanning tools misinterpret configurations or fail to detect applied patches.
To reduce noise:
Keep scanning engines updated
Validate system configurations prior to scanning
Review results manually
Pair scanning with human analysis
Automation is powerful. However, human oversight prevents wasted effort.
Windows and Linux environments require appropriate authentication and agents for deeper scanning.
Applications require authenticated testing to evaluate:
Session handling
Role-based access
Hidden endpoints
Privilege boundaries
If you need to:
Validate whether security controls actually prevent exploitation
Understand how attackers move laterally
Test identity abuse scenarios
Prove resilience to leadership
Prepare for real-world attack campaigns
Then penetration testing is required.
Scanning finds weaknesses. Penetration testing validates risk.
Strong vulnerability management programs combine:
Regular uncredentialed scans (external visibility)
Credentialed scans (internal validation)
Remediation tracking
Continuous monitoring
Periodic penetration testing (real-world validation)
The goal isn't just to identify vulnerabilities, but to reduce real attacker risk over time.
Credentialed and uncredentialed scans both play important roles in vulnerability management.
However, penetration testing showcases what threat actors can actually do.
Speak with an Account Executive