Domain 6 - Security Assessment and Testing Flashcards
Security Testing
verifies that a control is functioning properly. These tests include automated scans, tool-assisted penetration tests and manual attempts to undermine security. When scheduling security controls for review, information security managers should consider the following factors:
- Availability of security testing resources
- Criticality of the systems and applications protected by the tested controls Sensitivity of information contained on tested systems and applications
- Likelihood of a technical failure of the mechanism implementing the control
- Likelihood of a misconfiguration of the control that would jeopardize security
- Risk that the system will come under attack
- Rate of change of the control configuration
- Other changes in the technical environment that may affect the control performance
- Difficulty and time required to perform a control test
- Impact of the test on normal business operations
After assessing each of these factors, security teams design and validate a comprehensive assessment and testing strategy.
Verification
objective evidence that the design outputs of a phase of the SDLC meet requirements. 3rd party sometimes
Validation
develop “level of confidence” that the software meets all requirements and expectations, software improve over time Find back doors thru structured walk through
Network Flow logs
captured to provide insight into network traffic for security, troubleshooting, and performance management
Audit logging
provides information about events on the routers
NTP
Network Time Protocol, One important consideration is ensuring that logs have accurate time stamps and that these time stamps remain consistent throughout the environment. A common method is to set up an internal NTP server that is synchronized to a trusted time source such as a public NTP server. Other systems can then synchronize with this internal NTP server.
Syslog
message logging standard commonly used by network devices, Linux and Unix systems and other devices (firewalls)
Reboot – generates an information log entry
- Errors – significant problem
- Warnings – future problem - Information – successful operations
- Success Audits – successful security accesses
- Failure Audits – failed security access attempts
Inconsistent Time Stamps
often caused by improperly set time zones or due to differences in how system clocks are set
Modified logs
often a sign of intrusion or malicious intent NetFlow is a feature that was introduced on Cisco routers that provides the ability to collect IP network traffic as it enters or exits an interface. a network administrator can determine things such as the source and destination of traffic, class of service, and the causes of congestion.
Antimalware and Antivirus
records instances of detected malware
IDS/IPS
security testing, NIST 800-4
War driving
driving a car with notebook to find open access points
IDS
intrusion detection system
IDS: NETWORK BASED
- Detects intrusions on the LAN behind a firewall.
- Is passive while it acquires data.
- Reviews packets and headers
- Problem with network based is that it will not detect attacks by users logged into hosts
IDS: HOST BASED
- monitoring servers through EVENT LOGS AND SYSTEM LOGS
- as good as the completeness of the host logging
easier to discover and disable
Signature based method (AKA Knowledge based)
compared with signature attack database (aka misuse detector)
Statistical anomaly based
defines a ‘normal’ behavior and detects abnormal behaviors.
Response box
is a part of an IDS that initiates alarm or activity
IDS Components
Information source/sensor, centralized monitor software, data and even report analysis, database components and response to an event or intrusion
IPS
Intrusion prevention system - detect attack and PREVENT that attack being successfu
Remote Access Software
granted and secured through VPNs
Web Proxies
intermediate hosts, restrict access
Vulnerability Management Software
patching
Authentication Servers
SSO servers
Routers
permit or block traffic based on policy
Firewalls
more sophisticated than routers to examine traffic
Monitoring and auditing
Companies can set predefined thresholds for the number of certain types of errors that will be allowed before the activity is considered suspicious. This baseline is referred to as clipping level
Breaches
protect from breaches of confidentiality and integrity.
Protecting Logs : Availability
archival process to prevent loss by overwritten logs
Log Analysis
study logs for events of interest Set maximum size. If too small, attacker can make little changes and push them out of window
Real User Monitoring
aims to capture and analyze every transaction of a user
Synthetic Performance Monitoring
uses scripted or recorded data. Traffic capture, Db performance monitoring, website performance monitoring can be used. NOT User Session
Monitoring Types
- Proactive monitoring involves having external agents run scripted transactions against a web application
- Db monitoring; availability of Db
- TCP port monitoring; availability of website, service, or application
Code
Code Review and Testing
Code review is the foundation of software assessment programs. During a code review, also known as a “peer review,” developers other than the one who wrote the code review it for defects.
The most formal code review processes, known as Fagan inspections, follow a rigorous review and testing process with six steps:
- Planning
- Overview
- Preparation
- Inspection
- Rework
- Follow-up
Code Coverage Report
information on the functions, statements, branches, and conditions covered in testing. Use cases – used as part of test coverage calculation that divides the tested use case by total use cases
Code Review Report
generated if the organization was manually reviewing the application’s source code
Black-box testing
observes the system external behavior, no internal details known
Dynamic Testing
does not require access to source code, evaluates code in a runtime environment
White-box testing
(crystal) is a detailed exam of a logical path, checking the possible conditions. Requires access to source code