chap 7 - security assessment and testing Flashcards
main types of security assessment, audits, test or other activities
- Formal - evaluation against a compliance standard that may be a legal, regulatory or contract requirement.
performed by individuals who are outside the management structure of the organization - Informal - conducted to provide an insight/observations about the systems being evaluated but not for the direct purpose of meeting a compliance requirement
performed by in-house or outside the organization.
what is an audit
structured review of information, observations and other data to measure/determine compliance.
information products are ARTIFACTS, which are considered as evidence of the level of compliance
how are audits reported
reported formally to organization as a series of FINDINGS.
FINDINGS format would include:
- condition
- criteria
- cause
- effect
- recommendation
what is an assessment
assessments is an evaluation of controls to meet management expectations
what is an Service Organization Control reports (SOC reports)
AICPA framework for evaluating internal controls over financial reporting best known as Service Organization Control (SOC) report that EVALUATE ORGANIZATION CONTROLS AGAINST A SET OF 5 TRUST SERVICE PRINCIPLES
5 Trust Service Principles:
1. Security
2. availability
3. confidentiality
4. processing integrity
5. privacy
what is the structure of SOC reports
SOC 1 - attests to the condition over financial reporting
- SOC 1 type I: audit performance at particular point in time
- SOC 1 type II: audit performance over specific period
SOC 2 - Trust Services Criteria reports (TCS reports)
along 5 criteria: security / availability / confidentiality / processing integrity / privacy
- SOC 2 type I: verify design of controls at time of report
- SOC 2 type 2: assessing control effectiveness. over specific period
SOC 3 - summary of the findings and attestation of SOC 2 report, in less technical form -> designed for public release
SOC for cybersecurity - report focus on cybersecurity plan, programs, processes, procedures, services or functions used to meet cybersecurity requirements
type I vs. type II SOC reports
both type I and type II consider:
- fairness of the presentation of mgmt description of the service org system
- suitability of the design of the controls to achieve the related control objectives
- all of these as of a specific date
SOC 2 reports add : evaluate the operating effectiveness of controls
SOC 1 is similar to due of care
SOC 2 is similar to due diligence
what is the main steps in internal audit/assessment
- Chartering - management commitment starts the assessment process. scoping the assessment
Risk assessment must be conducted throughout the assessment ensure risk in managed - Testing - Vulnerability assessment suggests areas of vulnerability. PenTest evaluation system security from attacker perspective
- Reporting - as specified by management. disclosure of the results is management responsibility
- Remediating - Plan of Action and Milestones (POA&M)
what are external audit/assessment most common types of audit
- compliance audit: test specific controls to determine if compliant to standard
- Financial audits: evaluate accuracy of financial reporting
- Operational audits: test internal control process
- Information system audits: evaluate control performance of information system
- Integrated audit: combine elements from operational & financial systems control
- Forensic audit: discovering, investigating and reporting fraud/crimes
what is the structure of a SOC 2 report and a SOC 3 report
SOC 3 report include ISAE, SSAE:
- section 1: auditors opinion
- section 2: attestation/assertion of controls
- section 3: description of internal controls & objectives
SOC 2 report include ISAE, SSAE:
- section 1: auditors opinion
- section 2: attestation/assertion of controls
- section 3: description of internal controls & objectives
- Section 4: test operating effectiveness of controls
- Section 5: additional info
what is tailoring an assessment of controls
- tailored to the control that need to be assessed
- the depth and breadth of the assessment
- sampling the system
sampling the system can be either:
- statistical sampling
- judgmental sampling
what is logging best practice
event logs recording user activities, exceptions, faults and information security events should be produced, kept and regularly reviewed
how are logs management prioritized
prioritization of log entries is driven by organizational policies, regulatory standards and key business requirements
what are the four best practices in logging
- prioritize log management appropriately throughout the organization
- establish policies and procedures for log management
- create ad maintain a secure log management infrastructure -> “integrity of log for evidence”
4.provide adequate support for all staff with log management responsibilities
what is a key requirement for log security (ISO)
logging facilities and log information should be protected against tampering and unauthorized access
what is a testing exercise
testing is the process of comparing the actual behavior of a system, process or activity under defined conditions with its expected behavior
what are the 2 types of test
- compliance test: determine if the control exists and is operating properly
- substantive test: evaluates the proper operation of the process. it provides a higher degree of assurance that the process is performing as expected, but takes time & resources
what does code review/test include
- all required functions exist
- no foreign code is present
- no dead-end or unreachable code is present
- no backdoors or trapdoors are present
- coding standards have been met
- all code is of trustworthy provenance
What are key steps of code review during the planning & design phase
Architecture security review:
- prerequisite: model
- benefits: detecting architectural violations of security standards
threat modeling review:
- prerequisite: business case/scenario
- benefits: identify threats, impact and countermeasures
what are 2 type of code review during the application and development phase
- static analysis and security testing (SAST)
- static binary code analysis and manual binary review
what is a “misuse case” testing
test considering: the set of actions which could lead to systems integrity failures, malfunctions or other security compromises may be undertaken by a human actor
what is negative testing
designed to provide evidence of the application behavior if there is unexpected or invalid data
what are examples of test coverage analysis types
- statement coverage
- decision coverage
- condition coverage
- multi-condition coverage
- loop coverage
- path coverage
- data flow coverage
- populating required fields
- correspondence between data and field types
- allowed number of characters
- allowed data bounds and limits
what is interference testing
test the quality of the software products
evaluate whether systems or components pass data and control correctly to one another
what is ethical PenTesting
simulates actions of a threat actor using information the threat actor is likely to have available.
must by clearly defined by RULES OF ENGAGEMENT (RoE) that details the circumstance under which the PenTest is conducted
what is PenTesting basic methodology (steps)
- Chartering: define Rules of Engagement (RoE)
- Discovery: identify potential breadth of the environment
- Scanning: once scope of system defined, system is scanned to identify any potential weaknesses
- exploitation: the exploit is delivered and the tester documents the results of the compromise
- Reporting: incl. executive summary, recommendations, and all materials related to test (incl. credentials etc.)