17
Vulnerability Assessment Marcelo B. Silva Systems Engineer

Info Security - Vulnerability Assessment

Embed Size (px)

DESCRIPTION

Simple deck about Vulnerability Assessment and Penetration Test. Please download it if you want to see the presentation notes as well. :-)

Citation preview

Page 1: Info Security - Vulnerability Assessment

Vulnerability Assessment

Marcelo B. SilvaSystems Engineer

Page 2: Info Security - Vulnerability Assessment

Agenda• What is a Penetration Test?• What is a Vulnerability Assessment (VA)• The difference between a Pentest & a VA• Vulnerability Assessment Steps• Risks on an internal VA• Vulnerability Assessment steps with a 3rd Party• Legal considerations and justification• References

Page 3: Info Security - Vulnerability Assessment

What is a Penetration Test?

• There are two types of penetration (pen) tests– Black Box & White Box

• Analyzing assets for any weaknesses, weak configuration, or vulnerabilities

• Perspective of a potential attacker and leverages exploitation of known and unknown security vulnerabilities

• Validate information security programs • Ensure security controls

Page 4: Info Security - Vulnerability Assessment

What is a Penetration Test?

Which components are the targets?•Operating Systems •Directory Services•Backend Applications•Server firmware and Remote Control software•Network devices (Routers, Switches, Firewalls)

Page 5: Info Security - Vulnerability Assessment

What is Penetration Test?

The intruder could seek unauthorized access for:•Staging•Information Disclosure (Confidentiality)•Bots/Zombies (Availability)

Page 6: Info Security - Vulnerability Assessment

What is a Vulnerability Assessment (VA)?

“Security exercises that aid business leaders, security professionals, and hackers in identifying security liabilities within networks, applications,

and systems.” (Snedaker, 2007)

Page 7: Info Security - Vulnerability Assessment

What is a Vulnerability Assessment (VA)?

The Vulnerability Assessment detects vulnerabilities via:•Security Technologies– VA Scanners Appliances and Software

•Remediation Technologies– Patch management systems (WSUS, SCCM,

LanDesk, VMware Update Manager)

Page 8: Info Security - Vulnerability Assessment

Penetration Test vs. VA

Penetration Test:

• Confirm the vulnerabilities• Scan the network• Identify OS, Services and

TCP/UDP Ports on the hosts• Performs attacks and

penetration• Works to gain non-

authorized access

Vulnerability Assessment:

• Identify weaknesses• Identify and enumerates

Vulnerabilities• Report on discoveries

Page 9: Info Security - Vulnerability Assessment

Penetration Test vs. VA

Penetration Test:

To be used when:•We have a limited number of assets •Confirmation is needed•We are fiscally flexible •Time is not of the essence

Vulnerability Assessment:

To be used when:•Time is a constraint •Cost is an issue•Validating•Trending

Page 10: Info Security - Vulnerability Assessment

Vulnerability AssessmentThe 3 steps

1. Information Gathering and Discovery Example of tools: NMAP

2. Enumeration Example of tools: NMAP

3. Detection Example of tools: Retina

Page 11: Info Security - Vulnerability Assessment

Vulnerability AssessmentThe 3 steps

1. Information Gathering and Discovery– Network Scanning– Ports Scanning– Directory Service– DNS Zones and Registers

Page 12: Info Security - Vulnerability Assessment

Vulnerability AssessmentThe 3 steps

2. Enumeration– Hosts and OSs– Ports (including the well-known: 0-1023)– Services and their versions info– SNMP Communities

Page 13: Info Security - Vulnerability Assessment

Vulnerability AssessmentThe 3 steps

3. Detection– Weakness– Vulnerabilities– Reports are generated– Remediation Tools

Page 14: Info Security - Vulnerability Assessment

Risks on an internal VA

• Unavailability of the systems and applications• Impact on the network and systems

performance• Reaction from the IT staff as if some real

attack was taking place

Page 15: Info Security - Vulnerability Assessment

Vulnerability Assessment Steps with a 3rd Party

• The outsourcing company must follow the FISMA requirements, by applying the NIST standards and guidelines

• Establish an Information Security Assessment Policy to be followed• Determine the objectives of each security assessment• The consulting firm should be accountable for any damage caused

by errors on during the exercise• Sign a formal agreement for the Vulnerability Assessment• Non-disclosure information externally • The 3rd party should provide an Analyze findings, and develop risk

mitigation techniques accordingly and report security Incidents (FISMA 3544(b)(7))

• The 3rd party should periodically testing and evaluating the security controls and techniques (FISMA section 3544(a)(2)(D))

Page 16: Info Security - Vulnerability Assessment

VA Steps with a 3rd PartyLegal considerations and justification

• The 3rd parties are required to meet the same security requirements as federal agencies (FISMA and OMB policy)

• As part of the contract and the service-level agreements, the consulting firm requires the use of the security controls in NIST Special Publication 800-53 and 800-53A

• Evaluate potential legal concerns before starting an assessment (The assessments that involve intrusive tests - Pentest)

• Legal Department may review the assessment plan developed by the 3rd party

• The Legal Department should address privacy concerns, and perform other functions in support of assessment planning. (FISMA, section 3542(a)(1)(B))

Page 17: Info Security - Vulnerability Assessment

References:Snedaker, S. (2007). The Best Damn IT Security management Book Period, Syngress publishing.National Institute of Standards and Technology. (2009). Recommended Security Controls for Federal Information Systems and Organizations (NIST Special Publication 800-53, 2009 Edition). Gaithersburg, MD. National Institute of Standards and Technology. (2010). Guide for Applying the Risk Management Framework to Federal Information Systems (NIST Special Publication 800-37, revision 1). Gaithersburg, MD. National Institute of Standards and Technology. (2010a). Guide for Assessing the Security Controls in Federal Information Systems and Organizations (NIST Special Publication 800-53A). Gaithersburg, MD. Federal Information Security Management Act (FISMA). (2002). P.L. 107-347. Retrieved August 07, 2012, from http://csrc.nist.gov/drivers/documents/FISMA-final.pdf