SlideShare a Scribd company logo
Maximum Assurance: Key Decision Points for Network Vulnerability Assessments from the Maximum Assurance Series
Objective  The Maximum Assurance presentations are intended to unambiguously define and provide guidance on key decision points for Security Assessment activities that an organization may use to gain assurance to their security posture Terms Used to Communicate Activities Methodology (actions/steps/rationale) Scope (matching activity to objective) Key Decision Points  Value Proposition (Assurance level)
Quick Overview: Network Vulnerability Assessment  (NVA) Systematic examination of network attached devices  (e.g., computer, router) to identify vulnerabilities in design/ configuration that may cause negative impact  Vulnerabilities generally result from default configuration weakness, configuration errors, security holes in applications, missing patches NVA’s are often the first step in a Penetration Test but may also be used as a stand-alone test NVA’s provide significant value for both public and private networks/systems NVA’s are conducted by a network scanner (a purpose built computer) and generally include very little human involvement NVA’s are a good way to rapidly assess the efficacy of your vulnerability management program (e.g., patch/configuration management) NVA’s are prone to false positives NVA’s can provide a staggeringly high amount of information in a moderate or larger environment
Discrete Components of an NVA An NVA actually incorporates a number of discrete steps: Scoping – What network segments should I analyze? Discovery – What devices are out there? Port Scanning – What “ports” on the devices are “open” and willing to converse on? Vulnerability Detection – For the “services” (generally OS layer applications (e.g., telnet)) discovered are there problems with the configuration or version of that software that make it vulnerable? Advanced Techniques – Credentialed Scanning, Content Scans, etc. Reporting – Communicating the results of the NVA – preferably in a manner that is: Readily understood by management and technical resources Easily interpreted Actionable
Key Decision Points: Scoping Scoping (which/how many systems/network segments) and Extent/Rigor (what level of sampling and how in depth the scan is) is always based on objective of the test and should be proportional to risk Significant benefit to sampling across system types, network segments by function/geography to reduce data overload but gain representative data Scanning a statistically relevant lower number of systems with greater depth maximizes assurance  Leverage the information gained in the statistical sampling across the entire environment during the mitigation phase If warranted, post mitigation run a secondary “confirmatory” scan across  a different or wider sampling to confirm the efficacy of the mitigation efforts and provide a higher level of assruance.
Key Decision Points: The Discovery Phase Black/Grey/White Hat Posture: Unless one of the objectives of the activity is to validate that obfuscation/cloaking efforts are successful there are significant benefits to White Hat (providing the group conducting the scan the addresses to be scanned) It is less time consuming/expensive It is more accurate  For example, many VA Scanners will do a simple “ping” test to discover hosts which will miss any Windows XP desktop running the Windows Firewall
Key Decision Points: Port Scanning Ports are “addresses” that different services (applications) listen/process input on By default, many Vulnerability Scans will only be run on those ports that are commonly used or assigned ports (0 thru 1024) This approach saves time but will miss vulnerabilities in any applications using other ports including malware and back-doors as there are 65,535 ports By default, many Vulnerability Scans will only be run on TCP ports This approach saves time but will miss vulnerabilities associated with all services that respond on UDP as well If you run a high risk environment, will be scanning through a firewall, or are testing your incident response – you may want to incorporate more advanced port scanning methods (e.g., TCP FIN scans) to maximize the level of assurance that you achieve from your testing
Key Decision Points: Vulnerability Detection Operating Systems and applications/versions are inferred by the answers the host gives to the scanner By default, most scanners are set to “trust” the answers and act accordingly This can significantly reduce the assurance provided as the hosts may (un) intentionally give the vulnerability scanner bad  information (e.g., I'm running an Apache Web Server -when it is actually running IIS) as a trusting scanner will not look for IIS Vulnerabilities at that point Running in a “don’t trust the answers you get mode” increases the accuracy/assurance that you receive from an NVA Scanners only scan based on the library of OS, application, and vulnerability signatures that it is aware of Use a well regarded scanner and ensure that it is updated immediately before the scan takes place Some vulnerability checks have a higher probability of negatively impacting systems so defining if these checks should be run is critical
Key Decision Points: Vulnerability Detection If one of the objectives of a vulnerability scan is to gauge the effectiveness of an organizations Incident Detection and Incident Response Programs or Intrusion Prevention systems By default, most scanners are set to maximize speed Open as many connections to as many machines in the shortest time frame possible This makes them very “noisy” and easily detected /blocked Where assurance regarding Incident Detection /Prevention is intended a phased approach initiated from a a covert modality (intended to hide scanning activities by spreading them over greater periods of time and employing cloaking/evasive countermeasures) and gradually decrementing the evasiveness level is required For maximum assurance it is best to run Vulnerability Assessments with the IPS system in place and disabled Assurance that the IPS is operating as intended Assurance that if the IPS should fail or be evaded that the other security mechanisms are operating as intended
Key Decision Points: Advanced Techniques  Key new capabilities introduced in ‘08 & ‘09 Credentialed Scans Content Scans Passive Scans
Key Decision Points: Credentialed Scanning   Credentialed scans run as an administrative level user Much more accurate – Applications/version can be exactly determined Much greater depth – Can see patch history, system logging settings, full password settings) Can measure compliance against a standard (e.g., CIS, PCI, or corporate)  Greater time/cost to run generally offset by the reduction in false positives and simplified remediation
Key Decision Points: Content Scanning   Because a Credentialed scans run as an administrative level user we can extend it to look at the “content” Does the machine contain? Credit Card Data, Pornography, Medical Records, Social Security Numbers, Customer Records, Intellectual Property Can measure compliance against relevant standards  HIPAA, PCI, Sarbanes Oxley, Identify Theft Regulations  Greater time/cost to run generally offset by the increased assurance
Key Decision Points: Passive Scanning   Standard NVA’s are “active” in that they are based on inquiry and response NVA’s can crash services or systems In “mission critical” environments (e.g., a power plant or bank trading floor) this risk may not be acceptable Passive Scanning does not “inject” any traffic into the network – it just listens (sniffs)  to existing traffic Provides assurance in an environment without any risk of disrupting service Only identifies vulnerabilities for services that are actively communicating Greater time/cost  to run generally offset by gathering assurance where it was previously not feasible
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points

More Related Content

What's hot

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
Marco Morana
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
David Sweigert
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
Cahyo Darujati
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Andrew Gerber
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
Abu Sadat Mohammed Yasin
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
primeteacher32
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
Ian G
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
AHM Pervej Kabir
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
btpsec
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
Rand W. Hirt
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
Rishabh Upadhyay
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
Raghav Bisht
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Edureka!
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
Lancope, Inc.
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
AlienVault
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
NetStandard
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
Bill Ross
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
AlienVault
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
Adv. Prashant Mali ♛ [Bsc(Phy),MSc(Comp Sci), CCFP,CISSA,LLM]
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 

What's hot (20)

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 

Similar to Network Vulnerability Assessment: Key Decision Points

Web application Testing
Web application TestingWeb application Testing
Web application Testing
OWASP Foundation
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
Tawnia Beckwith
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
 
Assessing network security
Assessing network securityAssessing network security
Assessing network security
Abhinit Kumar Sharma
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
Nutan Kumar Panda
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
Philippe A. R. Schaeffer
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
KiwiQA
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
Argyle Executive Forum
 
Software testing overview subbu
Software testing overview subbuSoftware testing overview subbu
Software testing overview subbu
Subramanya Mudukutore
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
SecurityGen1
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
SecurityGen1
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
SecurityGen1
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security Solutions
SecurityGen1
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
Security Gen
 
Benchmarking our Network Vulnerability Scanner
Benchmarking our Network Vulnerability ScannerBenchmarking our Network Vulnerability Scanner
Benchmarking our Network Vulnerability Scanner
Pentest-Tools.com
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration Testing
ElanusTechnologies
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
koolkampus
 
Information Security 201
Information Security 201Information Security 201
Information Security 201
Null Bhubaneswar
 

Similar to Network Vulnerability Assessment: Key Decision Points (20)

Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Assessing network security
Assessing network securityAssessing network security
Assessing network security
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Software testing overview subbu
Software testing overview subbuSoftware testing overview subbu
Software testing overview subbu
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security Solutions
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
 
Benchmarking our Network Vulnerability Scanner
Benchmarking our Network Vulnerability ScannerBenchmarking our Network Vulnerability Scanner
Benchmarking our Network Vulnerability Scanner
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration Testing
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 
Information Security 201
Information Security 201Information Security 201
Information Security 201
 

Recently uploaded

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Network Vulnerability Assessment: Key Decision Points

  • 1. Maximum Assurance: Key Decision Points for Network Vulnerability Assessments from the Maximum Assurance Series
  • 2. Objective The Maximum Assurance presentations are intended to unambiguously define and provide guidance on key decision points for Security Assessment activities that an organization may use to gain assurance to their security posture Terms Used to Communicate Activities Methodology (actions/steps/rationale) Scope (matching activity to objective) Key Decision Points Value Proposition (Assurance level)
  • 3. Quick Overview: Network Vulnerability Assessment (NVA) Systematic examination of network attached devices (e.g., computer, router) to identify vulnerabilities in design/ configuration that may cause negative impact Vulnerabilities generally result from default configuration weakness, configuration errors, security holes in applications, missing patches NVA’s are often the first step in a Penetration Test but may also be used as a stand-alone test NVA’s provide significant value for both public and private networks/systems NVA’s are conducted by a network scanner (a purpose built computer) and generally include very little human involvement NVA’s are a good way to rapidly assess the efficacy of your vulnerability management program (e.g., patch/configuration management) NVA’s are prone to false positives NVA’s can provide a staggeringly high amount of information in a moderate or larger environment
  • 4. Discrete Components of an NVA An NVA actually incorporates a number of discrete steps: Scoping – What network segments should I analyze? Discovery – What devices are out there? Port Scanning – What “ports” on the devices are “open” and willing to converse on? Vulnerability Detection – For the “services” (generally OS layer applications (e.g., telnet)) discovered are there problems with the configuration or version of that software that make it vulnerable? Advanced Techniques – Credentialed Scanning, Content Scans, etc. Reporting – Communicating the results of the NVA – preferably in a manner that is: Readily understood by management and technical resources Easily interpreted Actionable
  • 5. Key Decision Points: Scoping Scoping (which/how many systems/network segments) and Extent/Rigor (what level of sampling and how in depth the scan is) is always based on objective of the test and should be proportional to risk Significant benefit to sampling across system types, network segments by function/geography to reduce data overload but gain representative data Scanning a statistically relevant lower number of systems with greater depth maximizes assurance Leverage the information gained in the statistical sampling across the entire environment during the mitigation phase If warranted, post mitigation run a secondary “confirmatory” scan across a different or wider sampling to confirm the efficacy of the mitigation efforts and provide a higher level of assruance.
  • 6. Key Decision Points: The Discovery Phase Black/Grey/White Hat Posture: Unless one of the objectives of the activity is to validate that obfuscation/cloaking efforts are successful there are significant benefits to White Hat (providing the group conducting the scan the addresses to be scanned) It is less time consuming/expensive It is more accurate For example, many VA Scanners will do a simple “ping” test to discover hosts which will miss any Windows XP desktop running the Windows Firewall
  • 7. Key Decision Points: Port Scanning Ports are “addresses” that different services (applications) listen/process input on By default, many Vulnerability Scans will only be run on those ports that are commonly used or assigned ports (0 thru 1024) This approach saves time but will miss vulnerabilities in any applications using other ports including malware and back-doors as there are 65,535 ports By default, many Vulnerability Scans will only be run on TCP ports This approach saves time but will miss vulnerabilities associated with all services that respond on UDP as well If you run a high risk environment, will be scanning through a firewall, or are testing your incident response – you may want to incorporate more advanced port scanning methods (e.g., TCP FIN scans) to maximize the level of assurance that you achieve from your testing
  • 8. Key Decision Points: Vulnerability Detection Operating Systems and applications/versions are inferred by the answers the host gives to the scanner By default, most scanners are set to “trust” the answers and act accordingly This can significantly reduce the assurance provided as the hosts may (un) intentionally give the vulnerability scanner bad information (e.g., I'm running an Apache Web Server -when it is actually running IIS) as a trusting scanner will not look for IIS Vulnerabilities at that point Running in a “don’t trust the answers you get mode” increases the accuracy/assurance that you receive from an NVA Scanners only scan based on the library of OS, application, and vulnerability signatures that it is aware of Use a well regarded scanner and ensure that it is updated immediately before the scan takes place Some vulnerability checks have a higher probability of negatively impacting systems so defining if these checks should be run is critical
  • 9. Key Decision Points: Vulnerability Detection If one of the objectives of a vulnerability scan is to gauge the effectiveness of an organizations Incident Detection and Incident Response Programs or Intrusion Prevention systems By default, most scanners are set to maximize speed Open as many connections to as many machines in the shortest time frame possible This makes them very “noisy” and easily detected /blocked Where assurance regarding Incident Detection /Prevention is intended a phased approach initiated from a a covert modality (intended to hide scanning activities by spreading them over greater periods of time and employing cloaking/evasive countermeasures) and gradually decrementing the evasiveness level is required For maximum assurance it is best to run Vulnerability Assessments with the IPS system in place and disabled Assurance that the IPS is operating as intended Assurance that if the IPS should fail or be evaded that the other security mechanisms are operating as intended
  • 10. Key Decision Points: Advanced Techniques Key new capabilities introduced in ‘08 & ‘09 Credentialed Scans Content Scans Passive Scans
  • 11. Key Decision Points: Credentialed Scanning Credentialed scans run as an administrative level user Much more accurate – Applications/version can be exactly determined Much greater depth – Can see patch history, system logging settings, full password settings) Can measure compliance against a standard (e.g., CIS, PCI, or corporate) Greater time/cost to run generally offset by the reduction in false positives and simplified remediation
  • 12. Key Decision Points: Content Scanning Because a Credentialed scans run as an administrative level user we can extend it to look at the “content” Does the machine contain? Credit Card Data, Pornography, Medical Records, Social Security Numbers, Customer Records, Intellectual Property Can measure compliance against relevant standards HIPAA, PCI, Sarbanes Oxley, Identify Theft Regulations Greater time/cost to run generally offset by the increased assurance
  • 13. Key Decision Points: Passive Scanning Standard NVA’s are “active” in that they are based on inquiry and response NVA’s can crash services or systems In “mission critical” environments (e.g., a power plant or bank trading floor) this risk may not be acceptable Passive Scanning does not “inject” any traffic into the network – it just listens (sniffs) to existing traffic Provides assurance in an environment without any risk of disrupting service Only identifies vulnerabilities for services that are actively communicating Greater time/cost to run generally offset by gathering assurance where it was previously not feasible