SlideShare une entreprise Scribd logo
1  sur  17
Maximum Assurance: Key Decision Points for Network Vulnerability Assessments from the Maximum Assurance Series
Objective  The Maximum Assurance presentations are intended to unambiguously define and provide guidance on key decision points for Security Assessment activities that an organization may use to gain assurance to their security posture Terms Used to Communicate Activities Methodology (actions/steps/rationale) Scope (matching activity to objective) Key Decision Points  Value Proposition (Assurance level)
Quick Overview: Network Vulnerability Assessment  (NVA) Systematic examination of network attached devices  (e.g., computer, router) to identify vulnerabilities in design/ configuration that may cause negative impact  Vulnerabilities generally result from default configuration weakness, configuration errors, security holes in applications, missing patches NVA’s are often the first step in a Penetration Test but may also be used as a stand-alone test NVA’s provide significant value for both public and private networks/systems NVA’s are conducted by a network scanner (a purpose built computer) and generally include very little human involvement NVA’s are a good way to rapidly assess the efficacy of your vulnerability management program (e.g., patch/configuration management) NVA’s are prone to false positives NVA’s can provide a staggeringly high amount of information in a moderate or larger environment
Discrete Components of an NVA An NVA actually incorporates a number of discrete steps: Scoping – What network segments should I analyze? Discovery – What devices are out there? Port Scanning – What “ports” on the devices are “open” and willing to converse on? Vulnerability Detection – For the “services” (generally OS layer applications (e.g., telnet)) discovered are there problems with the configuration or version of that software that make it vulnerable? Advanced Techniques – Credentialed Scanning, Content Scans, etc. Reporting – Communicating the results of the NVA – preferably in a manner that is: Readily understood by management and technical resources Easily interpreted Actionable
Key Decision Points: Scoping Scoping (which/how many systems/network segments) and Extent/Rigor (what level of sampling and how in depth the scan is) is always based on objective of the test and should be proportional to risk Significant benefit to sampling across system types, network segments by function/geography to reduce data overload but gain representative data Scanning a statistically relevant lower number of systems with greater depth maximizes assurance  Leverage the information gained in the statistical sampling across the entire environment during the mitigation phase If warranted, post mitigation run a secondary “confirmatory” scan across  a different or wider sampling to confirm the efficacy of the mitigation efforts and provide a higher level of assruance.
Key Decision Points: The Discovery Phase Black/Grey/White Hat Posture: Unless one of the objectives of the activity is to validate that obfuscation/cloaking efforts are successful there are significant benefits to White Hat (providing the group conducting the scan the addresses to be scanned) It is less time consuming/expensive It is more accurate  For example, many VA Scanners will do a simple “ping” test to discover hosts which will miss any Windows XP desktop running the Windows Firewall
Key Decision Points: Port Scanning Ports are “addresses” that different services (applications) listen/process input on By default, many Vulnerability Scans will only be run on those ports that are commonly used or assigned ports (0 thru 1024) This approach saves time but will miss vulnerabilities in any applications using other ports including malware and back-doors as there are 65,535 ports By default, many Vulnerability Scans will only be run on TCP ports This approach saves time but will miss vulnerabilities associated with all services that respond on UDP as well If you run a high risk environment, will be scanning through a firewall, or are testing your incident response – you may want to incorporate more advanced port scanning methods (e.g., TCP FIN scans) to maximize the level of assurance that you achieve from your testing
Key Decision Points: Vulnerability Detection Operating Systems and applications/versions are inferred by the answers the host gives to the scanner By default, most scanners are set to “trust” the answers and act accordingly This can significantly reduce the assurance provided as the hosts may (un) intentionally give the vulnerability scanner bad  information (e.g., I'm running an Apache Web Server -when it is actually running IIS) as a trusting scanner will not look for IIS Vulnerabilities at that point Running in a “don’t trust the answers you get mode” increases the accuracy/assurance that you receive from an NVA Scanners only scan based on the library of OS, application, and vulnerability signatures that it is aware of Use a well regarded scanner and ensure that it is updated immediately before the scan takes place Some vulnerability checks have a higher probability of negatively impacting systems so defining if these checks should be run is critical
Key Decision Points: Vulnerability Detection If one of the objectives of a vulnerability scan is to gauge the effectiveness of an organizations Incident Detection and Incident Response Programs or Intrusion Prevention systems By default, most scanners are set to maximize speed Open as many connections to as many machines in the shortest time frame possible This makes them very “noisy” and easily detected /blocked Where assurance regarding Incident Detection /Prevention is intended a phased approach initiated from a a covert modality (intended to hide scanning activities by spreading them over greater periods of time and employing cloaking/evasive countermeasures) and gradually decrementing the evasiveness level is required For maximum assurance it is best to run Vulnerability Assessments with the IPS system in place and disabled Assurance that the IPS is operating as intended Assurance that if the IPS should fail or be evaded that the other security mechanisms are operating as intended
Key Decision Points: Advanced Techniques  Key new capabilities introduced in ‘08 & ‘09 Credentialed Scans Content Scans Passive Scans
Key Decision Points: Credentialed Scanning   Credentialed scans run as an administrative level user Much more accurate – Applications/version can be exactly determined Much greater depth – Can see patch history, system logging settings, full password settings) Can measure compliance against a standard (e.g., CIS, PCI, or corporate)  Greater time/cost to run generally offset by the reduction in false positives and simplified remediation
Key Decision Points: Content Scanning   Because a Credentialed scans run as an administrative level user we can extend it to look at the “content” Does the machine contain? Credit Card Data, Pornography, Medical Records, Social Security Numbers, Customer Records, Intellectual Property Can measure compliance against relevant standards  HIPAA, PCI, Sarbanes Oxley, Identify Theft Regulations  Greater time/cost to run generally offset by the increased assurance
Key Decision Points: Passive Scanning   Standard NVA’s are “active” in that they are based on inquiry and response NVA’s can crash services or systems In “mission critical” environments (e.g., a power plant or bank trading floor) this risk may not be acceptable Passive Scanning does not “inject” any traffic into the network – it just listens (sniffs)  to existing traffic Provides assurance in an environment without any risk of disrupting service Only identifies vulnerabilities for services that are actively communicating Greater time/cost  to run generally offset by gathering assurance where it was previously not feasible
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points

Contenu connexe

Tendances

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureDavid Sweigert
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisIan G
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Reportbtpsec
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Rishabh Upadhyay
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemLancope, Inc.
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the CloudNetStandard
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software developmentBill Ross
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 

Tendances (20)

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 

Similaire à Network Vulnerability Assessment: Key Decision Points

Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperTawnia Beckwith
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration TestingKiwiQA
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfSecurityGen1
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenSecurityGen1
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecurityGen1
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurity Gen
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurityGen1
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingElanusTechnologies
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21koolkampus
 

Similaire à Network Vulnerability Assessment: Key Decision Points (20)

Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Assessing network security
Assessing network securityAssessing network security
Assessing network security
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Software testing overview subbu
Software testing overview subbuSoftware testing overview subbu
Software testing overview subbu
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security Solutions
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration Testing
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 
Information Security 201
Information Security 201Information Security 201
Information Security 201
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 

Dernier

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Dernier (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Network Vulnerability Assessment: Key Decision Points

  • 1. Maximum Assurance: Key Decision Points for Network Vulnerability Assessments from the Maximum Assurance Series
  • 2. Objective The Maximum Assurance presentations are intended to unambiguously define and provide guidance on key decision points for Security Assessment activities that an organization may use to gain assurance to their security posture Terms Used to Communicate Activities Methodology (actions/steps/rationale) Scope (matching activity to objective) Key Decision Points Value Proposition (Assurance level)
  • 3. Quick Overview: Network Vulnerability Assessment (NVA) Systematic examination of network attached devices (e.g., computer, router) to identify vulnerabilities in design/ configuration that may cause negative impact Vulnerabilities generally result from default configuration weakness, configuration errors, security holes in applications, missing patches NVA’s are often the first step in a Penetration Test but may also be used as a stand-alone test NVA’s provide significant value for both public and private networks/systems NVA’s are conducted by a network scanner (a purpose built computer) and generally include very little human involvement NVA’s are a good way to rapidly assess the efficacy of your vulnerability management program (e.g., patch/configuration management) NVA’s are prone to false positives NVA’s can provide a staggeringly high amount of information in a moderate or larger environment
  • 4. Discrete Components of an NVA An NVA actually incorporates a number of discrete steps: Scoping – What network segments should I analyze? Discovery – What devices are out there? Port Scanning – What “ports” on the devices are “open” and willing to converse on? Vulnerability Detection – For the “services” (generally OS layer applications (e.g., telnet)) discovered are there problems with the configuration or version of that software that make it vulnerable? Advanced Techniques – Credentialed Scanning, Content Scans, etc. Reporting – Communicating the results of the NVA – preferably in a manner that is: Readily understood by management and technical resources Easily interpreted Actionable
  • 5. Key Decision Points: Scoping Scoping (which/how many systems/network segments) and Extent/Rigor (what level of sampling and how in depth the scan is) is always based on objective of the test and should be proportional to risk Significant benefit to sampling across system types, network segments by function/geography to reduce data overload but gain representative data Scanning a statistically relevant lower number of systems with greater depth maximizes assurance Leverage the information gained in the statistical sampling across the entire environment during the mitigation phase If warranted, post mitigation run a secondary “confirmatory” scan across a different or wider sampling to confirm the efficacy of the mitigation efforts and provide a higher level of assruance.
  • 6. Key Decision Points: The Discovery Phase Black/Grey/White Hat Posture: Unless one of the objectives of the activity is to validate that obfuscation/cloaking efforts are successful there are significant benefits to White Hat (providing the group conducting the scan the addresses to be scanned) It is less time consuming/expensive It is more accurate For example, many VA Scanners will do a simple “ping” test to discover hosts which will miss any Windows XP desktop running the Windows Firewall
  • 7. Key Decision Points: Port Scanning Ports are “addresses” that different services (applications) listen/process input on By default, many Vulnerability Scans will only be run on those ports that are commonly used or assigned ports (0 thru 1024) This approach saves time but will miss vulnerabilities in any applications using other ports including malware and back-doors as there are 65,535 ports By default, many Vulnerability Scans will only be run on TCP ports This approach saves time but will miss vulnerabilities associated with all services that respond on UDP as well If you run a high risk environment, will be scanning through a firewall, or are testing your incident response – you may want to incorporate more advanced port scanning methods (e.g., TCP FIN scans) to maximize the level of assurance that you achieve from your testing
  • 8. Key Decision Points: Vulnerability Detection Operating Systems and applications/versions are inferred by the answers the host gives to the scanner By default, most scanners are set to “trust” the answers and act accordingly This can significantly reduce the assurance provided as the hosts may (un) intentionally give the vulnerability scanner bad information (e.g., I'm running an Apache Web Server -when it is actually running IIS) as a trusting scanner will not look for IIS Vulnerabilities at that point Running in a “don’t trust the answers you get mode” increases the accuracy/assurance that you receive from an NVA Scanners only scan based on the library of OS, application, and vulnerability signatures that it is aware of Use a well regarded scanner and ensure that it is updated immediately before the scan takes place Some vulnerability checks have a higher probability of negatively impacting systems so defining if these checks should be run is critical
  • 9. Key Decision Points: Vulnerability Detection If one of the objectives of a vulnerability scan is to gauge the effectiveness of an organizations Incident Detection and Incident Response Programs or Intrusion Prevention systems By default, most scanners are set to maximize speed Open as many connections to as many machines in the shortest time frame possible This makes them very “noisy” and easily detected /blocked Where assurance regarding Incident Detection /Prevention is intended a phased approach initiated from a a covert modality (intended to hide scanning activities by spreading them over greater periods of time and employing cloaking/evasive countermeasures) and gradually decrementing the evasiveness level is required For maximum assurance it is best to run Vulnerability Assessments with the IPS system in place and disabled Assurance that the IPS is operating as intended Assurance that if the IPS should fail or be evaded that the other security mechanisms are operating as intended
  • 10. Key Decision Points: Advanced Techniques Key new capabilities introduced in ‘08 & ‘09 Credentialed Scans Content Scans Passive Scans
  • 11. Key Decision Points: Credentialed Scanning Credentialed scans run as an administrative level user Much more accurate – Applications/version can be exactly determined Much greater depth – Can see patch history, system logging settings, full password settings) Can measure compliance against a standard (e.g., CIS, PCI, or corporate) Greater time/cost to run generally offset by the reduction in false positives and simplified remediation
  • 12. Key Decision Points: Content Scanning Because a Credentialed scans run as an administrative level user we can extend it to look at the “content” Does the machine contain? Credit Card Data, Pornography, Medical Records, Social Security Numbers, Customer Records, Intellectual Property Can measure compliance against relevant standards HIPAA, PCI, Sarbanes Oxley, Identify Theft Regulations Greater time/cost to run generally offset by the increased assurance
  • 13. Key Decision Points: Passive Scanning Standard NVA’s are “active” in that they are based on inquiry and response NVA’s can crash services or systems In “mission critical” environments (e.g., a power plant or bank trading floor) this risk may not be acceptable Passive Scanning does not “inject” any traffic into the network – it just listens (sniffs) to existing traffic Provides assurance in an environment without any risk of disrupting service Only identifies vulnerabilities for services that are actively communicating Greater time/cost to run generally offset by gathering assurance where it was previously not feasible