Security Plus - Chapter 5 Flashcards
Vulnerability Management
A program used to identify, prioritize, and remediate vulnerabilities.
Vulnerability Scanning
Tools used to detect new vulnerabilities as they arise and implement a remediation workflow that addresses the highest priority vulnerabilities.
Asset Inventory
A list of all of the assets that are in an environment.
Asset Criticality
Determining the level of importance that an asset is to the organization and how the asset should be protected with security controls.
Asset Map
The asset inventory as it is distributed throughout the organizations network.
Risk Appetite
The willingness to tolerate risk within the environment.
Regulatory Requirements
Requirements imposed by governmental agencies to provide guidance on how to apply security controls to protect the organization’s data.
PCI
HIPAA
FISMA
Technical Constraints
The lack of technical resources that a tool may have to complete the requested task. Ex. The scanning system may only be capable of performing a certain number of scans per day, and organizations may need to adjust scanning frequency to ensure scans complete successfully.
Business Constraints
The lack of business resources that may cause a tool the inability to complete a task. Ex. Running a vulnerability scan may result in high usage of server resources that in turn may cause a slowdown of the network.
Licensing Limitations
Licensing of a scanning tool may either be a limitation of the amount of bandwidth the tool is permitted to use or a limit of the number of assets that the tool is permitted to scan.
Vulnerability Scan Configuration
All of the functions that are established to schedule, produce reports, determine the types of checks performed, provide credentials to access the targets, installation of scanning agents and conduct scans from a variety of network perspectives.
Scan Sensitivity Levels
These settings determine the types of checks that the scanner will perform and should be customized to ensure that the scan meets its objectives while minimizing the possibility of disrupting the target environment.
Credentialed Scanning
Scans of network assets with a provided network login to improve the accuracy of the vulnerability scans. These can provide the scanner with the ability to access operating systems, databases, and applications as well. This could cause some disruption to these systems though with this increased scanning ability.
Server-Based Scanning
Vulnerability scanning performed by a tool installed on a server within the network.
Agent-Based Scanning
Administrators install small software agents on each target server which provides an inside out scan and report information back to vulnerability management platform for analysis and reporting.
Scan Perspectives
Conducting scans from different locations within the network, providing a different view into vulnerabilities. Ex. External, Internal, Data Center
Controls That May Affect Scan Results
Firewall Settings
Network segmentation
Intrusion Detection Systems
Intrusion Prevention Systems
Vulnerability Feeds
Updates of vulnerabilities that are sent to the vulnerability management platform on a regular basis.
Security Content Automation Protocol (SCAP)
An effort by the security community led by the National Institute of Standards (NIST), to create a standardized approach for communicating security-related information.
SCAP Standards
Common Configuration Enumeration (CCE)
Common Platform Enumeration (CPE)
Common Vulnerabilities and Exposures (CVE)
Common Vulnerability Scoring System (CVSS)
Extensible Configuration Checklist Description Format (XCCDF)
Open Vulnerability and Assessment Language (OVAL)
Common Configuration Enumeration (CCE)
Provides a standard nomenclature for discussing system configuration issues.
Common Platform Enumeration (CPE)
Provides a standard nomenclature for describing product names and versions.
Common Vulnerabilities and Exposures (CVE)
Provides a standard nomenclature for describing security-related software flaws.
Common Vulnerability Scoring System (CVSS)
Provides a standardized approach for measuring and describing the severity of security-related software flaws.
Extensible Configuration Checklist Description Format (XCCDF)
A language for specifying checklists and reporting checklist results.
Open Vulnerability and Assessment Language (OVAL)
A language for specifying low-level testing procedures used by checklists.
Network Vulnerability Scanner Examples
Tenable Nessus - Widely respected and one of the first products introduced
Qualys - Commercially available and more recent product
Rapid 7 Nexpose - Commercially available and more recent
OpenVAS free alternative to commercially available
Static Application Testing
Analyzes code without executing the code.
Dynamic Application Testing
Executes the code as part of the test, running the interfaces that the code exposes to the user with a variety of inputs, searching for vulnerabilities.
Interactive Application Testing
Analyzes the source code while testers interact with the application through exposed interfaces.
Web Application Scanning
Tools that examine the security of web applications that test for web-specific vulnerabilities like SQL injection, cross site scripting (XSS), and cross-site request forgery (CSRF) vulnerabilities.
Vulnerability Report Reviews
Nessus - Vulnerability Name, Overall Severity, Detailed Description, Solution, See Also (References), Output (Description of the remote section), Portal/Hosts (Details on the server that contains the vulnerability), Vulnerability Information (Miscellaneous information about the vulnerability, Risk Information (Useful information for assessing the severity of the vulnerability.
Common Vulnerability Scoring System (CVSS)
An industry standard for assessing the severity of security vulnerabilities. It scores vulnerabilities on a variety of measures:
Attack Vector Metric - Evaluates the exploitability
Attack Complexity Metric - Evaluates the exploitability
Privileges Required Metric - Evaluates the exploitability
User Interaction Metric - Evaluates the exploitability
Confidentiality Metric - Evaluates the impact of the vulnerability
CVSS Confidentiality Metric - Evaluates the impact of the vulnerability
Integrity Metric - Evaluates the impact of the vulnerability
Availability Metric - Evaluates the impact of the vulnerability
Scope Metric - Scope of the vulnerability
Attack Vector Metric
Describes how an attacker would exploit the vulnerability.
Attack Complexity Metric
Describes the difficulty of exploiting the vulnerability.