10
CipherTechs Audit Practice Overview

Audit Practice at CipherTechs

Embed Size (px)

Citation preview

Page 1: Audit Practice at CipherTechs

CipherTechs Audit Practice Overview

Page 2: Audit Practice at CipherTechs

Security Lifecycle Security Lifecycle

Risk Assessment

Step 1: Define Information

Security objectives

Step 2: Define how objectives will be

accomplished

Security Policy Development

Step 3: Deploy controls to

accomplish the objectives

Step 4: Verify that the deployed controls match

the set objectives Does #2 = #3?

Firewalls

VPNs

Authentication

Intrusion Detection

Content Security

Application Security

Router/Switch

Auditing/LoggingEvent CorrelationDesktop Security

C-Level

Medium durationC-Level/Director

Med/Long durationDirector/Operations

Short DurationC-Level/Director

Medium/Long DurationA

djus

tmen

ts

External Network Audit

Wireless Audit

Web Application Audit

Internal Network Audit

PBX Audit

Periodic Network Audit

Page 3: Audit Practice at CipherTechs

What is Audit?

–In theory verifying that you have met your objectives –In practice: Compliance, Policy, Assessments, Forensics –Compliance with government or business regulations including:

• PCI• HIPAA • Sarbanes Oxley• Gramm Leach

–Policy usually defined as written standards, guidelines, and procedures (defined differently by a Firewall engineer)

–Assessments: A variety of tests to provide assurance• To test an IDS or a Managed Service or Firewall or IT staff• Required by compliance• Required by a business partner• As a best security practice

–Forensics

Page 4: Audit Practice at CipherTechs

Compliance

–Help clients understand and react to a variety of terminology and requirements

–Ultimately allows the business to manage risk–Specific task to be performed might include:

• Actual compliance work• Help in preparation for an audit• Help in remediation from an audit• Accompany a client to an audit

Page 5: Audit Practice at CipherTechs

Policy

–Might be tailored to a particular group or management level• Desktop policy for desktop support, termination policy for HR

–Sometimes required by a compliance requirement• As an example PCI mandates that a plan exist to test incident handling response and that it be tested annually

–Policy development related to product implementation• Corporate policy might first be established to ban skype and then firewalls and NACs will be configured to implement that policy

Page 6: Audit Practice at CipherTechs

Assessments

– External Network Assessments– Internal Network Assessments– Web Assessments–Rapid Risk Assessment–Security Health Survey–Infrastructure Device Review–Wireless Assessment–War Dial–Social Engineering

Assessment can vary greatly depending on the requirement. Ultimately Statements of Work will be written that govern the assessment to be performed.

Page 7: Audit Practice at CipherTechs

External Network Vulnerability Assessments

“For the External portion of the assessment CipherTechs will assume a role of an outside party attempting to gather information about and/or gain unauthorized access to the information resources contained in CLIENT’s protected network segments. “

–Required by compliance–Required by a business partner–To test an IDS or a Managed Service or Firewall …–To test the response of IT staff–As a best security practice

Page 8: Audit Practice at CipherTechs

Internal Network Assessments

“CipherTechs will assume the role of an internal user with average permissions who seeks to escalate privileges or otherwise gain access to confidential data or resources “

– Might be required by compliance–To test an IDS/IPS or staff or user –To discover what is in your network–As a best security practice

Page 9: Audit Practice at CipherTechs

Web Assessments

“Objective of this web application security vulnerability assessment was to discover deficiencies from both an authorized and an unauthorized standpoint in the Web Application. Once the full testing had been completed, CipherTechs was expected to provide recommendations for technical and process improvements and assist in resolution of any major security issues and improvement in security strategy.”

• Unauthenticated, Authenticated, and Admin perspectives• Code Analysis possible• CipherTechs typically uses a methodology that closely follows

the OWASP Top Ten Web Application Vulnerabilities

Page 10: Audit Practice at CipherTechs

Miscellaneous

• CipherTechs is a Security Solutions Provider• Participates in RFP bids• Meet n Greets• Redacted documents are available• www.ciphertechs.com