Security Assessment and Testing
Security Assessment and Testing
Security Assessment and Testing
Testing
Components
• There are three main components
• Security Test
• Security Assessment
• Security Audit
Security Testing Security Assessment Security Audit
• Symbloic link is a stub file that redirects the access to another place; if attacker can
compromise the symbolic link, they may be able to gain unauthorized access
Symbolic Links • Countermeasure: programs/scripts must be written to full path to file cannot be
circumvented
• Numbers many OS use to represent open files in a process; certain file descriptor numbers
are universal, meaning same thing to all programs
File Descriptor attack • Countermeasure: Good programming language, developer education; automated source
code scanners and application security testing
• Exists when a design of a program puts it in a vulnerable condition before ensuring that
those vulnerabilities are mitigated
Race Condition • Counter measure: Good programming language, developer education; automated source
code scanners and application security testing
• Attacks rely on inappropriate access control of some part of the system on which a more
File and Directory permissions secure part of the system depends
• Countermeasure: File Integrity checkers
Penetration Testing
• Goes beyond vulnerability testing and actually tries to exploit the
system
• They require focused attention from trained security professionals
• Its goal is the measure an organizations’ level of resistance to an
attack and to uncover any weaknesses within the environment
• It emulates the same methods attackers would use
• The type of penetration testing should depend upon
• The organization, its security objectives, and the managements’ goals
• The result is a report given to management that describes the
vulnerabilities identified and the severity of those vulnerabilities. IT
also may provide mitigating strategies
• Its critical Senior Management is aware of this and have given
authority to do so
Penetration Testing Process
• The tester only has • Also known as stealth • Involves external and
publicly available data to assessment internal parties carrying
work with • It is a blind test to both the out a focused test on
• The network security team tester as well as the specific areas of interest
has prior knowledge of security team
this test to defend • It is used to evaluate the
security levels and
responses of the security
team
• It is a realistic
demonstration of the likely
success or failure of an
attack
Log Review
• Examination of system logs to detect security events or verify effectiveness
of security controls
• The most key requirement for effective log review is the synchronization
across all the log sources
• NTP is the protocol for time synchronization (UDP 123)
• NTP:
• Oldest protocol used in internet
• Time value is sent in a UDP datagram that carries a 64-bit timestamp on port 123
• It’s a client/server architecture, with hierarchical time sources organized into strata
• Stratum 0 is the most authoritative and consists of highly accurate time sources such
as atomic clocks, GPS
• Stratum 1 consists of primary time sources that are directly connected to stratum 0
• Stratum 2 are local network servers that an organization’s NTP server will connect
• Stratum 3 are other local servers and clients
• Nodes on the same stratum can communicate with each other to improve efficiency of
their times
Log Tampering Prevention
• Remote Logging:
• Putting a log file into another device will protect from tampering it in a
compromised system
• Simplex Communication:
• Using one way communication between the reporting devices and the central
log repository. Accomplished by severing the “receive” pairs on an Ethernet
cable.
• Data diode ~ physically ensuring one-way path
• Replication:
• Making multiple copies and keeping them in different locations
• Write-once media:
• Using write-once media to prevent unauthorized modifications to log files
• Cryptographic Hash:
• Powerful technique for ensuring unauthorized modifications are easily
noticed.
Synthetic Transactions
• Transactions that are initiated by an end-user is called real
transactions
• Automatic script based transaction with expected output is
called Synthetic Transaction
• They allow to systematically test the behavior and performance of
critical services
• They can help test new service mimicking end-user behaviors to
ensure systems work as it ought to
• This is an effective way of testing software from the outside
Synthetic Transactions Vs Real User Monitoring
• Physical Interfaces
• Exists in some applications that manipulate machinery, logic controllers etc.
• Testers should pay careful attention to physical interfaces because of the potential
consequences if they fail
Test Coverage Analysis
• It is practically impossible to complete test a software
• Testing professionals conduct Test Coverage Analysis to estimate the degree of
testing conducted against the new software.
• It is computed using the formula
• Testing that all employees are aware of AUP and other applicable policies can
be the first step in auditing user accounts
• The AUP should also dictate the default expiration date of accounts, the
password policy, and the information to which a user should have access.
Modifying/Suspending accounts
• Accumulation of access privileges over the life time of an employee in the
organization results in privilege accumulation.
• This is a dangerous practice that gives the employee more privileges than
needed for performing their job function
• The first exercise should not include all employees rather a small representative
sample of the organization
• People conducting the drills should expect to encounter problems and mistakes
BCP Drills
Checklist Test Structured walk-through Simulation Test Parallel Test Full-Interruption Test
• Copies of BCP/DR plan • Representatives from • This test takes a lot of • Some systems are • Most intrusive to
distributed to the each department come planning and resources moved to alternate site regular operations
different departments together and go over • All employees and processing takes • The original site is shut
for review the plan participating in place down and processing
• This ensures nothing is • The group reviews the operational and • The results are takes place at the
taken for granted or objective, scope, support functions come compared with the alternate site
omitted assumptions of the together to practice a regular processing • Recovery team fulfills
• Planning team plan specific scenario done at original site its obligations in
integrates all changes • The group walks- • It raises the awareness • Ensures specific preparing the systems
to the master plan through different level of the people systems can function and environments for
• It is also called desktop scenarios of the plan involved adequately at alternate the alternate site
or table top test from beginning to end • The drill shall include site during disaster • All processing is done
to make sure nothing is only those materials at alternate site
left out that will be available in • It should be performed
an actual disaster. only after all other tests
• The test continues upto are completed
the point where satisfactorily
physical migration to • Senior mgmt. approval
new facility gets is needed before
initiated performing this test
Security Training and Awareness
• Security training is the process of teaching a skill or set of skills that will allow
people to perform specific tasks better
• The key measure of security awareness program is the degree to which the
users change their behaviors when presented with a certain situation
Social Engineering
• Process of manipulating individuals so that they perform actions that violate the security
policy
• Phishing – the most popular form of social engineering attack conducted through digital
communication
• Measurement: the value of a factor at a particular point in time. This is the raw data
• Eg: 20 AV alerts per day or 15 investigations per month
• Baseline: An arbitrary value for a factor that provides a point of reference or denotes that some
condition is met by achieving some threshold value
• Eg: number of AV alerts per month will not be more than 25, or the number of investigations open for more than 48
hrs should not be more than 10
Key Performance Indicators (KPI)
• Some key terms associated with KPI
• Metric: A desired value that is generated by comparing various results with each other or
baseline
• Eg: ratio of false-positives AV alerts to valid alerts per month
• They measure how risky an activity is so that leadership can make informed
decisions about the activity
• KRIs are selected for their impact on the decisions of the senior leaders in the
organization
• KRIs alert us when something bad is likely to happen so that we can change our
behavior and defeat the threat
Technical Reporting
• The technical report should be the application of a standard methodology to the
specific system of study
• Vulnerabilities
• Probability of exploitation
• Impact
• Recommended actions
Executive Summary
• Translate the key findings and recommendations into language that is
approachable and meaningful to the senior leadership
www.cyintegriti.com