Technical Security Audit and Assessments
DISCLAIMER
-
This document contains unedited notes and has not been formally
proofread.
-
The information provided in this document is intended to provide a
basic understanding of certain technologies.
-
Please exercise caution when visiting or downloading from websites
mentioned in this document and verify the safety of the website and
software.
-
Some websites and software may be flagged as malware by antivirus
programs.
-
The document is not intended to be a comprehensive guide and should not
be relied upon as the sole source of information.
-
The document is not a substitute for professional advice or expert
analysis and should not be used as such.
-
The document does not constitute an endorsement or recommendation of
any particular technology, product, or service.
-
The reader assumes all responsibility for their use of the information
contained in this document and any consequences that may arise.
-
The author disclaim any liability for any damages or losses that may
result from the use of this document or the information contained
therein.
-
The author reserve the right to update or change the information
contained in this document at any time without prior notice.
-
Any attempts to perform penetration testing or ethical hacking on
systems or networks should be done with the explicit permission of the
system/network owner. Unauthorized access is illegal and can result in
serious legal consequences.
-
It is important to fully understand the scope of the testing and to
only test within that scope. Testing outside the agreed upon scope is
considered unauthorized and may result in legal action.
-
Any findings or vulnerabilities discovered during testing should be
reported to the system/network owner immediately and kept confidential
until a fix can be implemented.
-
It is recommended to use a separate, dedicated testing environment
rather than testing on a live production system to minimize the risk of
accidentally causing damage or downtime.
-
It is important to take steps to protect your own identity and prevent
accidental data leaks or exposure of sensitive information during
testing.
-
It is also recommended to follow a standard code of ethics for ethical
hacking and penetration testing.
References
- ISO standards
-
Performing a Technical Security Audit and Assessment - LinkedIn
Contents:
-
Security Assessment reviews
-
Identifying and analyzing Targets
-
Planning Technical Security Assessments
-
Executing the Technical security
************************************************************************************************
Audit Life Cycle:
Audit = Reasonable assurance never 100%
Finding evidence, show effectiveness, assurance
- Audit Planning:
- Audit Charter
- Objective
-
Expected outcomes
- Audit Plan
-
The scope of the audit
-
The periodicity of the audit
- Audit Selection
- Audit Scheduling
- Audit Execution:
- Audit Closure:
-
Continual Improvement.
********************
Audit planning:
- Scope selection:
-
Risk based approach:
-
audit scope based on identified risk areas.
-
Project Phase Alignment:
-
The audit scope aligns with the current project phase (e.g.,
initiation, execution, closure).
-
Addressing Past NC's:
-
Based on the previous non-conformances and weaknesses
-
Meeting External Certification Requirements:
-
The audit scope ensures compliance with external
certification standards.
-
Audit Plan communication and review
-
Clear Communication:
-
The finalized audit plan is effectively communicated to all
stakeholders for review.
-
Approval Process:
-
The audit plan undergoes a formal approval process.
-
Scheduling and Confirmation:
-
Audit dates and auditee availability are reviewed and
confirmed.
-
Finalized Schedule Published:
-
The final audit schedule is published to all relevant
parties.
Conducting Audit :
- Pre-Audit Preparation
-
Status of previous Non-conformances, weakness and
observations.
-
Offline data analysis, if required.
- Conducting Audit
-
Interacting with Auditee
-
Gathering evidence based on the scope of the audit.
-
Using defined checklist, processes
- Nc’s Communications
-
Agreeing with auditee the Non-conformances, weakness and
observations if any.
-
If any, non agreement. Having internal meetings with relevant
stakeholders, to arrive at a decision.
- Audit Reporting
-
Publishing the agreed upon NC’s, weakness and
observations
-
Publishing with the expected date of closure and responsible
person for closure.
- Risk tracker
-
Updating the risk tracker, based on the Audit findings
for any potential risks.
- Continual Improvement
-
Tracking the NC’s, weakness and observations to closure.
-
Root cause analysis for the audit findings.
-
Identifying any training, improvement plans based on the Audit
findings.
***************
Audit Preparation for external certification:
(Timeline 6 months):
-
Assigning Single Points of Contact (SPOCs):
-
Identify SPOCs for each project to ensure clear lines of
communication and ownership.
-
Resource Risk Assessment:
-
Evaluate the risk of key personnel leaving the organization
before the audit.
-
Identify backup resources to mitigate the risk of SPOC
departure.
-
Tailored Project Training:
-
Provide targeted training to team members based on their
specific project roles and responsibilities.
-
Audit Gap Analysis and Readiness Review:
-
Conduct Gap Analysis:
-
Identify any discrepancies between current practices and the
external certification standards.
-
Develop RAG Status Report:
-
Clearly communicate the findings of the gap analysis using a
Red-Amber-Green (RAG) status system to indicate the severity
of each gap.
-
Track Remediation Progress:
-
Monitor the progress of closing identified gaps until all
issues are resolved.
***************************************************************************
Technical Security Audit and Assessments Notes:
Overview:
-
To find security weakness and technical vulnerabilities
-
Determining the compliance with standards
-
Security assessment when conducted periodically - will give valuable
insights on current security posture.
-
Periodic assessment will give results to compare and arrive at trends
on security gaps.
|
Phases involved
|
Documentation:
-
Facilitated continual improvement
-
Helps new staff come up to speed
-
Security assessment is a living document
Conducting
-
spend less time scrambling,
Phases:-
-
Planning
-
Security controls in scope
-
External = outside org network
-
Execution
-
Identify and validate vulnerabilities
-
Post Execution
-
NIST SP 800-53A, Assessing Security and Privacy controls and Open
source Testing Methodology manual.
How to find out - How secure, the system and Networks are
-
Review.
-
Review techniques are often manual examinations of systems,
applications, networks, policies, and procedures to ensure they meet
minimum security requirements.
-
Firewall and switch rulesets
-
Target Identification and analysis.
-
Automated tools conduct
-
Ports and service identification
-
Target vulnerability validation.
-
are used to confirm that any vulnerabilities identified in earlier
testing are valid.
Testing View Point:
-
External = outside the org network and physical assets.
-
Internal
-
In the view of malicious insider, who has access and trying to
escalate privileges
-
Overt testing - white hat testing
-
Covert testing - black hat testing
-
Costly and time consuming
Security Assessment reviews:
-
Process of examining docs, sys files, networks to look for
vulnerabilities & security gaps
-
Review tech
-
Documentation review
-
Requested docs - Security policy, standards, processes,
procedures.
-
Security plans and configuration instructions.
-
Network architecture and diagrams.
-
Evidence of third party testing or certifications.
-
Regulatory standards - HIPAA, PCI, ISO27001
-
Looking for outdated, missing or inaccurate info.
-
log review,
-
Log review is determined if systems are adequately logging
important security events and if the organization is following its
own logging policies and standards.
-
IDS/IPS logs or malicious acts
-
Firewall logs for outbound connections
-
Anti-malware logs for software failures
-
Patch logs for deployment failures
-
Backup system logs for backup failures
-
Tools used like - MS Log parser
-
ruleset review (Firewall rule sets),
-
Firewall actions
-
Permitting and routing packets
-
Creating system events and alerts
-
SANS - firewall checklist
-
All firewall policy has corresponding rules
-
Unnecessary open ports - closed
-
Traffics doesn't escapes defense
-
Rules enforce least privilege access
-
Algosec
-
Solar winds
-
360-FAAR
-
system configuration review,
-
Is done to identify incorrect or missing sys settings
-
Configurations misaligned with Sec Standards
-
checklists from the NIST National Checklist Program
Repository or from the Center for Internet Security
-
network sniffing,
-
Collect and review information
-
Identity systems and services
-
Uncover potential security vulnerabilities
-
File integrity checking.
-
Malicious activities - can delete certain files and replace the
existing ones -
-
If an important file changes during their assessment without
proper permission and without telling system or security
administrators, that could be a problem. File integrity checks
help organizations keep an eye on the security of their most
important files.
-
How exposed is your organization is to data loss due to human error
on a set of database systems
-
Security Controls
-
Org require and enforce least privileges
-
Who all have access to the database servers
-
How frequent is the data back up done
-
Are data backup is adequate in event of data loss
-
Documentation review
-
policies , standards, guidelines
-
Log reviews
-
Ruleset reviews
-
Critical systems needs to be isolated from main network
-
System configuration review
-
Correct set of controls configured
-
Regular database integrity reviews
Identifying and analyzing Targets:-
-
To determine which systems and devices are available on the
network
-
After identifying next steps involves testing
-
Techniques used for identifying
-
Conducting network discovery
-
Purpose and functions of network devices - Need knowledge on
TCP/IP
-
IP addressing and subnetting
-
Identifying network ports and services
-
Ports and services workflow
-
Common ports and services
-
Port and service scanning tools
-
Scanning for vulnerabilities
-
Protocols and system misconfigurations
-
Vulnerability scanning tools
-
Scanning wireless network.
-
Wifi protected access, WPA
-
Conduct network discovery
-
ISMP or echo request or ping
-
Sometime noisy and creates traffic
-
Can slow down network
-
Cause a denial of service
-
Communicate in advance for running active n/w discovery
-
Passive
-
Network sniffing tools
-
Wireshark - captures open ports, operating systems of
devices
-
Sniffer
-
Placed in the network, where it captures the network
traffic.
-
Stealthy
-
No detection of devices that aren't active
-
Network discovery Tool
-
Identify network ports and services
-
E.g - Port 80 = HTTP = Active yes = likely Apache/ Microsoft
IIS
-
Functions - web server / FTP server
-
Security vulnerabilities on ports &
services
-
OS fingerprinting
-
Port = 111 = likely OS = Unix or Linux
-
Port = 135, 139, 445 = likely OS = windows
-
Scan devices for vulnerabilities
-
Scan to find outdated software,
-
Used to validate system compliance with internal security
configurations.
-
Vulnerability scanners require Admin privileges to run and
perform scanning.
-
Local Vulnerability scanning
-
Network vulnerability scanning
Planning Technical Security Assessments
-
Security Assessment Policy
-
Vulnerability assessment policy
-
Guidance for Sec Assess
-
Sec std the org should comply with.
-
Network and Systems in scope
-
Documentation and reporting requirements
-
Roles and responsibilities
-
Who receives the final reports
-
Who is responsible for remediation
-
Effective policy
-
Approved by relevant stakeholders
-
Communicated to staff and 3rd parties
-
Review and update periodically.
-
Prioritize and schedule
-
Define objectives
-
Quarterly assess & Standards - 27001
-
Scopes
-
All systems or sub-set of systems
-
System priority
-
Assessment time - overdue
-
Technical consideration - significant
vulnerabilities
-
Frequent requirements
-
Resource availability
-
Size and complexity
-
Choosing Techniques
-
Perspective
-
Test external facing systems
-
E.g Compliance with 27001 std
-
Ruleset and security configuration reviews
-
Network discovery and vulnerability scanning
-
Penetration test with social engineering
-
Select the Assessors
-
Technical security assessors
-
Strong IT understanding- n/w, OS, firewalls
-
Assessment leads
-
Experience in leading audits
-
Project Management skills
-
Internal Assessors
-
Part of ITr security of internal audit
-
Conduct assessment in accordance with policies
-
Recommend mitigation for security gaps
-
Third party / External Assessors
-
Selecting locations
-
Internal testing from any part of the network
-
External testing - outside the org n/w
-
Right privilege access for internal testing
-
Select tools and resources
-
Third party assessors - laptop with capabilities
-
Internal assessors - local desktop
-
Develop assessment plan
-
Systems and network in scope
-
IP addresses and MAc address
-
How to handle a security breach
-
E.g. Security Assessment methodology
-
How data will be gathered
-
To conduct assessment, scripts and software tools will be
used to run the following tests against the in-scope
systems
-
Network discovery to find unknown or rouge systems
-
Port and service discovery to identify OS and potential
vulnerabilities
-
Will attempt to exploit any known exploitable
vulnerabilities
-
How security controls will be tested
-
Testing will be conducted during business hrs to give
incident response team maximum opportunity to detect and
respond
-
The response or lack of response will be noted as part of
results
-
Keeping tech support alert in due to failure of systems
during testing
-
No DOS attack will be carried out
-
When testing will be conducted
-
After testing is concluded, analyze any vulnerabilities
found
-
The mitigation plan and recommendation will be
identified
-
All findings, results, and test conduct are recorded in the
final report and published with relevant stakeholders.
Executing the Technical security
-
Coordinating the assessments
-
All key stakeholders are aware
-
Assessors have privileges and access
-
Higher management informed
-
Communication in all stages to key stakeholders
-
Conduct assessments
- Some risk
-
Security attack can be discovered
-
High severity vulnerability found mid-way
-
Standard escalation procedures to be followed in occurrence
of these risks.
-
An unrealistic assessment plan not complied within budget
or timeline.
- Conduct analysis
-
Found vulnerabilities are validated by manually on the each
systems
-
Validated vulnerabilities are categories
-
Control families - NIST 800-53
- Finding Root cause
-
Common root cause found
-
Infrequent signature updates
- Data Handling
-
Assessment plans and rules of engagement
-
Configurations and network documentations
-
Results for testing tools
-
Assessments findings and reports
-
Remediation recommendations
-
Data lifecycle phases
-
Creations, collection or receipt
-
Assessment data stored in encrypted form
Post testing activities
-
Recommended Mitigations
-
Are reviewed and accepted
-
Finally Report the results
-
Final Report
-
Describe why and how testing is done
-
Vulnerabilities of system, network, and remediations
recommendations
-
Implementation of remediation and mitigations
-
Who is responsible for implementing the mitigation plans
-
What implemented and validated
-
Modification applied to test systems
-
Then moved to production systems
This is end of the conducting technical security
assessments.
*********************************************************************************************************
search keyword: Security Audit, GRC, Governance, Risk, Compliance,
Quality Management
Comments
Post a Comment