Chapter 5 Security Assessment and Testing Flashcards
What factors determine scan frequency
organizations risk appetite (willingness to tolerate risk) regulatory requirements (InfoSec is FIMSA, payment card is PCI DSS) Tech constraints Business constraints such as periods of high activity Licensing constraints may curtail bandwidth
Scan sensitivity
improve efficiency by disabling unnecessary plugins,
What is credentialed scanning
credentialed scanning is a scan in which the scan computer has an account on the computer being scanned.
- allows for more thorough check looking for problems that can’t be seen from the network
- use principle of least privilege by providing scanner a read only account
What is agent-based scanning
A scan in which admins install small software agents on target server to scan server configuration, providing an inside out vulnerability scan
Scan perspective
External scan run from network shows what an attacker would see
Internal scan run. from general corporate network provides view of what malicious insiders see
Scanner Maintenance
Scanners are vulnerable just like any other program, so ensure they are regularly updated and patched
SCAP (Security Content Automation Protocol)
Includes CVE and CVSS
others are CCE, CPE, XCCDF and OVAL
Infrastructure Vulnerability Scanning
Tenable’s Nessus
Qualys’ (SaaS)
Rapid7 Nexpose
OpenVAS (open source)
Application Scanning - what is static testing vs dynamic testing vs interactive testing?
static testing analyzes code without executing it
dynamic testing executes code as part of the test
interactive testing combines the two
Web app scanning
Tools like Nikto and Arachni test for web specific vulnerabilities like SQL injection, XSS, and XSRF
CVSS
AV - Attack Vector AC - Attack Complexity P - Privileges, scope calculation is included here UI - User Interaction C - Confidentiality I - Integrity A - Availability S - Scope (scored in Privilege)
Patch Management
Patch management is a CORE PRACTICE of any InfoSec program
it is often neglected due to lack of resources for preventative maintenance. It is common to see out of date product versions of OS or apps
Legacy Platforms
Software vendors eventually discontinue support of products. Continuing to run end of life systems is a significant security risk
Upgrade to a currently supported version
Weak Configurations
Weak Configuration includes:
- Use of default settings and passwords
- presence of unsecured accounts
- open ports and services not necessary for operation
- open permissions violating the principle of least privilege
Error Messages/Debug mode
Many apps support debug mode
can be useful to developers but can assist attackers in gaining info about the system
Developers should test only on dedicated systems and can use debug mode, but public facing systems do NOT need this capability