Chapter 15 Flashcards

1
Q

Security assessment program

A
  1. Security testing - verifies controls are performing as expected; can be automated; for internal use and reporting
  2. Security assessment - review security of system or env via risk assessment; for internal use and reporting; NIST (800-53A) specified assessment objects:
    - Spec and requirements
    - Mechanisms or controls
    - Activities
    - People
  3. Security audit - similar to assessment but by independent party (auditor); evaluation for demonstrating effectiveness to 3rd party
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Security Audit

A
  • Internal Audit - internal staff and for internal consumption
  • External Audit - external hired by org but not controlled by org
  • Third-party Audit - hired by another org; not controlled by org

Standard:
SOC 1 - financial reporting
SOC 2 - evaluate CIA; only disclose externally with NDA
SOC 3 - evaluate CIA; for public disclosure

Reports:
Type I - document review only
Type II - auditors actually test controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Standard Assessment and Audit frameworks

A

COBIT
ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describing vulnerabilities

A

SCAP (Security Content Automation Protocol) by NIST; elements include:

  • CVE - description
  • CVSS - scoring system
  • CCE - config enumeration
  • CPE - platform enumeration; OS, app, dev
  • XCCDF (Extensible Config Checklist Description Format) - language for security checklist exchange
  • OVAL (Open Vulnerability Assessment Language) - language for security testing procs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Vulnerability Scanning

A

4 categories:
- Network Discovery Scan - ports only; nmap
- Network Vulnerability Scan - go beyond port scan
- Web Vulnerability Scan
- DB Vulnerability Scan - e.g. sqlmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Discovery Scan

A

Identify open ports
- TCP SYN scan - half open
- TCP Connect scan - full connection
- TCP ACK scan - test firewall
- UDP scan
- Xmas scan - all flags set

Nmap tool:
- Open, closed, filtered, unfiltered, open|filtered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability mgmt workflow

A
  1. Detection - via scan
  2. Validation - verify is not false report
  3. Remediation - apply patch, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Penetration Testing

A

Phases as per NIST:
1. Prepare
2. Discovery
3. Attack
4. Report

Use MetaSploit

White-box testing - known env
Black-box testing - unknown env
Gray-box testing - partially known env

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BAS (Breach and Attack Simulation)

A

Test security controls, such as placing a suspicious file on server to trigger control mechanism
Combines blue and red team techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Code Review

A

Fagan inspections - formal process:
1. Planning
2. Overview
3. Preparation
4. Inspection
5. Rework - back to Planning
6. Follow-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Static Testing

A

Source code analysis, using automation tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dynamic Testing

A

Involves actual testing
- Synthetic transactions - scripted transactions w/ known expected results
- Benchmarks - involves performance metrics

Fuzz testing - injects invalid, malformed, or unexpected inputs; e.g. bit flipping using zzuf tool
- Mutation/Dumb fuzzing - modify valid input to create
- Generational/Intelligent fuzzing - use data model to create

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Interface Testing

A

API
User interfaces
Network interfaces
Physical interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Misuse case testing or abuse case testing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Test Coverage

A

Typical formula:
use cases tested / total use cases * 100

But can also use:
- branch coverage
- condition coverage
- function coverage
- loop coverage
- statements coverage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Penetration testing teams

A

Red team - attacker
Blue team - defend
White team - observe and judge
Purple team - red + blue for post test lessons learned

17
Q

Other security mgmt processes:
- Log reviews
- Account reviews
- Backups verification
- Training & Awareness
- Monitor KPI and risk indicatiors

18
Q

Website monitoring

A

Passive monitoring - capture traffic for monitoring; one type is Real User Monitoring (RUM)

Synthetic monitoring (active monitoring) - inject synthetic transactions to monitor performance