Domain 6. Chapter 15 Flashcards
Domain 6 Security Assessment and Testing
1. Three major components of a security assessment program:
1.1 Security tests
1.2 Security assessments
1.3 Security audits
1.1 Security tests
Security tests verify that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests, and manual attempts to undermine security.
When scheduling security controls for review, information security managers should consider the following factors:
- Availability of security testing resources
- Criticality of the systems and applications protected by the tested controls
- Sensitivity of information contained on tested systems and applications
- Likelihood of a technical failure of the mechanism implementing the control
- Likelihood of a misconfiguration of the control that would jeopardize security
- Risk that the system will come under attack
- Rate of change of the control configuration
- Other changes in the technical environment that may affect the control performance
- Difficulty and time required to perform a control test
- Impact of the test on normal business operations
Experimentation with new tools is fine, but security testing programs should be carefully designed and include rigorous, routine testing of systems using a risk-prioritized approach.
Тесты безопасности проверяют, что элемент управления работает правильно. Эти тесты включают автоматическое сканирование, тесты на проникновение с помощью инструментов и ручные попытки подорвать безопасность.
При планировании проверки мер безопасности менеджеры по информационной безопасности должны учитывать следующие факторы: Доступность ресурсов для тестирования безопасности Критичность систем и приложений, защищаемых протестированными средствами управления Чувствительность информации, содержащейся в тестируемых системах и приложениях. Вероятность технического отказа механизма, реализующего контроль Вероятность неправильной настройки элемента управления, которая поставит под угрозу безопасность. Риск того, что система подвергнется атаке Скорость изменения конфигурации управления Другие изменения в технической среде, которые могут повлиять на эффективность контроля. Сложность и время, необходимое для выполнения контрольного теста Влияние теста на нормальную бизнес-операцию
1.2 Security assessments
Security assessments are comprehensive reviews of the security of a system, application, or other tested environment. During a security assessment, a trained information security professional performs a risk assessment that identifies vulnerabilities in the tested environment that may allow a compromise and makes recommendations for remediation, as needed.
NIST Special Publication 800-53A: Assessing Security and Privacy Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans.
Under NIST 800-53A, assessments include four components:
- Specifications are the documents associated with the system being audited. Specifications generally include policies, procedures, requirements, specifications, and designs.
- Mechanisms are the controls used within an information system to meet the specifications.
Mechanisms may be based in hardware, software, or firmware. - Activities are the actions carried out by people within an information system. These may include performing backups, exporting log files, or reviewing account histories.
- Individuals are the people who implement specifications, mechanisms, and activities.
1.3 Security audits
Security audits use many of the same techniques followed during security assessments but must be performed by independent auditors.
Assessment and testing results are meant for internal use only and are designed to evaluate controls with an eye toward finding potential improvements. Audits, on the other hand, are evaluations performed with the purpose of demonstrating the effectiveness of controls to a third party.
Auditors provide an impartial, unbiased view of the state of security controls. They write reports that are quite similar to security assessment reports, but those reports are intended for different audiences that may include an organization’s board of directors, government regulators, and other third parties.
There are three main types of audits:
1.3.1 internal audits,
1.3.2 external audits,
1.3.3 and third-party audits.
Аудиторы обеспечивают беспристрастное и непредвзятое мнение о состоянии мер безопасности. Они пишут отчеты, которые очень похожи на отчеты об оценке безопасности, но эти отчеты предназначены для различной аудитории, которая может включать совет директоров организации, государственные регулирующие органы и другие третьи стороны. Существует три основных типа аудита: внутренний аудит, внешний аудит и аудит третьей стороны.
1.3.1 Internal audits
Internal audits are performed by an organization’s internal audit staff and are typically intended for internal audiences. The internal audit staff performing these audits normally have a reporting line that is completely independent of the functions they evaluate. In many organizations, the chief audit executive reports directly to the president, chief executive officer (CEO), or similar role.
1.3.2 External audits
External audits are performed by an outside auditing firm. These audits have a high degree of external validity because the auditors performing the assessment theoretically have no conflict of interest with the organization itself.
most large organizations use the so-called Big Four audit firms:
Ernst & Young
Deloitte
PricewaterhouseCoopers
KPMG
1.3.3 Third-party audits
Third-party audits are conducted by, or on behalf of, another organization. For example, a regulatory body might have the authority to initiate an audit of a regulated firm under contract or law.
International Standard for Attestation Engagements (ISAE) 3402, Assurance Reports on Controls at a Service Organization.
SSAE 18 and ISAE 3402 engagements are commonly referred to as service organization controls (SOC) audits, and they come in three forms:
- SOC 1 Engagements Assess the organization’s controls that might impact the accuracy of financial reporting.
- SOC 2 Engagements Assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system. SOC 2 audit results are confidential and are normally only shared outside the organization under an NDA.
- SOC 3 Engagements Assess the organization’s controls that affect the security (confidentiality, integrity, and availability) and privacy of information stored in a system. However, SOC 3 audit results are intended for public disclosure.
They differ in the scope of the opinion provided by the auditor:
- Type I Reports These reports provide the auditor’s opinion on the description provided by management and the suitability of the design of the controls. Type I reports also cover only a specific point in time, rather than an extended period. You can think of the Type I report as more of a documentation review where the auditor is checking things out on paper and making sure that the controls described by management are reasonable and appropriate.
- Type II Reports These reports go further and also provide the auditor’s opinion on the operating effectiveness of the controls. That is, the auditor actually confirms that the controls are functioning properly. The Type II report also covers an extended period of time: at least six months of operation. You can think of the Type II report as more like a traditional audit. The auditors are not just checking the paperwork; they are also going in and verifying that the controls function properly.
Type II reports are considered much more reliable than Type I reports because they include independent testing of controls.
1.3 Auditing Standards
- Control Objectives for Information and Related Technologies (COBIT). COBIT describes the common requirements that organizations should have in place surrounding their information systems. The COBIT framework is maintained by ISACA.
- ISO 27001 describes a standard approach for setting up an information security management system, and ISO 27002 goes into more detail on the specifics of information security controls.
- Vulnerability Assessments (part of 1.1 Security tests)
Vulnerability scans and penetration tests provide security professionals with a perspective on the weaknesses in a system or application’s technical controls by identifying technical vulnerabilities that they contain. Vulnerabilities are weaknesses in systems and security controls that might be exploited by a threat.
2.1 Describing Vulnerabilities
NIST provides the community with the Security Content Automation Protocol (SCAP).
The components of SCAP most directly related to vulnerability assessment include these:
- Common Vulnerabilities and Exposures (CVE) provides a naming system for describing security vulnerabilities.
- Common Vulnerability Scoring System (CVSS) provides a standardized scoring system for describing the severity of security vulnerabilities.
- Common Configuration Enumeration (CCE) provides a naming system for system configuration issues.
- Common Platform Enumeration (CPE) provides a naming system for operating systems, applications, and devices.
- Extensible Configuration Checklist Description Format (XCCDF) provides a language for specifying security checklists.
- Open Vulnerability and Assessment Language (OVAL) provides a language for describing security testing procedures.
2.2 Vulnerability Scans
Vulnerability scans automatically probe systems, applications, and networks, looking for weaknesses that may be exploited by an attacker. The scanning tools used in these tests provide quick, point-and-click tests that perform otherwise tedious tasks without requiring manual intervention.
There are four main categories of vulnerability scans:
2.2.1 network discovery scans,
2.2.2 network vulnerability scans,
2.2.3 web application vulnerability scans,
2.2.4 database vulnerability scans.
2.2.1 Network Discovery Scanning
Network discovery scanning uses a variety of techniques to scan a range of IP addresses, searching for systems with open network ports.
Network discovery scanners use many different techniques to identify open ports on remote systems. Some of the more common techniques are as follows:
- TCP SYN Scanning Sends a single packet to each scanned port with the SYN flag set. This indicates a request to open a new connection. If the scanner receives a response that has the SYN and ACK flags set, this indicates that the system is moving to the second phase in the three-way TCP handshake and that the port is open. TCP SYN scanning is also known as “half-open” scanning.
- TCP Connect Scanning Opens a full connection to the remote system on the specified port. This scan type is used when the user running the scan does not have the necessary permissions to run a half-open scan. Most other scan types require the ability to send raw packets, and a user may be restricted by the operating system from sending handcrafted packets.
- TCP ACK Scanning Sends a packet with the ACK flag set, indicating that it is part of an open connection. This type of scan may be done in an attempt to determine the rules enforced by a firewall and the firewall methodology.
- UDP Scanning Performs a scan of the remote system using the UDP protocol, checking for active UDP services. This scan type does not use the three-way handshake, because UDP is a connectionless protocol.
- Xmas Scanning Sends a packet with the FIN, PSH, and URG flags set. A packet with so many flags set is said to be “lit up like a Christmas tree,” leading to the scan’s name.
2.2.2 Network Vulnerability Scanning
Network vulnerability scans go deeper than discovery scans. They don’t stop with detecting open ports but continue on to probe a targeted system or network for the presence of known vulnerabilities.
By default, network vulnerability scanners run unauthenticated scans.
This allows the scan to run from the perspective of an attacker but also limits the ability of the scanner to fully evaluate possible vulnerabilities. One way to improve the accuracy of the scanning and reduce false positive and false negative reports is to perform authenticated scans of systems.
The Open Web Application Security Project (OWASP) maintains a comprehensive list at https://oiwasp.org/www-community/Vulnerability_Scanning_Tools. The open source OpenVAS scanner also has a growing community of users.
2.2.2 Network Vulnerability Scanning
LEARNING TCP PORTS
Interpreting port scan results requires knowledge of some common TCP ports. Here are a few that you should commit to memory when preparing for the CISSP exam:
FTP: 20/21
SSH: 22
Telnet: 23
SMTP: 25
DNS: 53
HTTP: 80
POP3: 110
NTP: 123
Windows File Sharing: 135, 137–139, 445
HTTPS: 443
LPR/LPD: 515
Microsoft SQL Server: 1433/1434
Oracle: 1521
H.323: 1720
PPTP: 1723
RDP: 3389
HP JetDirect printing: 9100
2.2.3 Web Vulnerability Scanning
Web vulnerability scanners are special-purpose tools that scour web applications for known vulnerabilities.
Do network vulnerability scans and web vulnerability scans sound similar? That’s because they are! Both probe services running on a server for known vulnerabilities. The difference is that network vulnerability scans generally don’t dive deep into the structure of web applications, whereas web application scans don’t look at services other than those supporting web services.
It’s a good practice to run scans in the following circumstances:
Scan all applications when you begin performing web vulnerability scanning for the first time. This will detect issues with legacy applications.
Scan any new application before moving it into a production environment for the first time.
Scan any modified application before the code changes move into production.
Scan all applications on a recurring basis. Limited resources may require scheduling these scans based on the priority of the application. For example, you may wish to scan web applications that interact with sensitive information more often than those that do not.
For example, the Payment Card Industry Data Security Standard (PCI DSS), discussed in Chapter 4, “Laws, Regulations, and Compliance,” requires that organizations either perform web application vulnerability scans at least annually or install dedicated web application firewalls to add additional layers of protection against web vulnerabilities.