CISSP Domain 6 Flashcards
Security audit types
Internal: Org performs
External: big4
Third party: EY auditing your third party behalf of another organization
Soc1 , SoC 2 and SoC 3
Finance
Trust security - CIAP, nda to be signed
Trust security- can be shared public disclosure
Type 1 and Type 2 reports
Type 1: documentation review by auditor
Type 2: Effectiveness of controls over period of time , at least 6 months
4 types of vulnerability scans
Scan to be done on IP ranges and open ports
Network discovery scan
Network vulnerability scans
Web application scans
Database vulnerability scans
Network discovery scan techniques
TCP SYN scan- half open scanning
TCP connect scan- open a full connection in specified port
TCP ack scan- Determine rules enforced by the firewall technology
UDP scanning- remote system using UDP protocol and checking UDP services
X mas scanning- FIN, PSH and URG flags set “ lit up like a Christmas tree”
Network vulnerability scans
Database of known vulnerability instead of detection of open ports
Authenticated scans
improve scanning and accuracy to reduce false positives
Scanner has read only access to servers getting scanned and can read config info from the targeted system when analysis testing results
Vulnerability management flow
Detection
Validation
Remediation
Pen test process
Planning: Rules of engagement
Info gathering and discovery
Attack
Reporting
White box test
Known environment test
By-pass reconciance test
Testing your software principle
Never depend on users behaving properly. Software to expect the unexpected. This is known as exception handling
Code Review
Planning
Overview
Preparation
Inspection
Re-work
Follow-up
Code Review - Fagan
Peer review- manual walkthrough
Senior developer review
Automated review of tools
Static review
Without running and analysing source code
Dynamic testing
Software in runtime testing and can include *synthetic transactions**
Scripted transaction with known results