Sec+ Chapter 05: Security Assessment and Testing Flashcards
Vulnerability management
Identifying, prioritizing, and remediating vulnerabilities in our environments
Vulnerability scanning
How we detect new vulnerabilities and implement a remediation workflow that addresses the highest priorities first
Scanners look at a huge amount of information, but not everything
Looks at very specific signatures for known vulnerabilities that can be x-referenced online
Minimally invasive, unlike pentests
Asset inventory / map
The result of using scanning tools to search the network for connected systems, whether they were previously known or unknown
Nessus
Created by Tenable, one of the first vulnerability scanners on the market that’s widely used today
Configuration review
A process conducted on vulnerability scanners to ensure their settings match current requirements
Factors that influence how often vulnerability scans are run
1) Risk appetite
2) Regulatory requirements
3) Technical constraints
4) Business constraints
5) Licensing limitations
Credentialed scanning
When you provide the scanner with credentials that allow it to connect to a target server
Known environment scan, emulates insider attack
Agent based scanning
Installed agents conduct scans for an inside-out view of a server
Reports info back to vulnerability management platform
Can cause performance and stability issues
Scan perspectives
Conducting a scan from a different location on the network
EX: External vs internal scans
Controls that could affect scans
1) Firewall settings
2) Network segmentation
3) IDS
4) IPS
SCAP
Security content automation protocol
Effort led by NIST to create a standardized approach for communicating security-related info
CCE
Common configuration enumeration
SCAP standard for system configuration issues
CPE
Common platform enumeration
SCAP standard for product names and versions
CVE
Common vulnerabilities and exposures
SCAP standard for security-related flaws
CVSS
Common vulnerability scoring system
SCAP standard for severity of security-related flaws
XCCDF
Extensible configuration checklist description format
SCAP standard for checklists and reporting checklist results
OVAL
Open vulnerability and assessment language
SCAP standard for specifying low-level testing procedures used by checklists
Scanning tools you need
1) Network vulnerability scanner
2) Application scanner
3) Web app scanner
Network vulnerability scanner
Tool that detects the presence of vulnerabilities on network-connected devices
4 commonly used network vulnerability scanners
1) Qualys
2) Rapid7 Nexpose
3) OpenVAS
4) Nessus
Application scanner
Tool that analyzes custom-developed software to identify common security vulnerabilities
Should always be integral to dev process
Static application testing
Analyzing code without executing it
Points devs at vulnerabilities and provides specific remediation suggestions
Dynamic application testing
Executes code as part of a test
Runs all interfaces that the code exposes a user to with a variety of inputs
Interactive application testing
Combination of static and dynamic testing
Analyzes the source code while testers interact with the application through exposed interfaces