SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Maximum Assurance: Key Decision Points for Network Vulnerability Assessments from the Maximum Assurance Series
Objective  The Maximum Assurance presentations are intended to unambiguously define and provide guidance on key decision points for Security Assessment activities that an organization may use to gain assurance to their security posture Terms Used to Communicate Activities Methodology (actions/steps/rationale) Scope (matching activity to objective) Key Decision Points  Value Proposition (Assurance level)
Quick Overview: Network Vulnerability Assessment  (NVA) Systematic examination of network attached devices  (e.g., computer, router) to identify vulnerabilities in design/ configuration that may cause negative impact  Vulnerabilities generally result from default configuration weakness, configuration errors, security holes in applications, missing patches NVA’s are often the first step in a Penetration Test but may also be used as a stand-alone test NVA’s provide significant value for both public and private networks/systems NVA’s are conducted by a network scanner (a purpose built computer) and generally include very little human involvement NVA’s are a good way to rapidly assess the efficacy of your vulnerability management program (e.g., patch/configuration management) NVA’s are prone to false positives NVA’s can provide a staggeringly high amount of information in a moderate or larger environment
Discrete Components of an NVA An NVA actually incorporates a number of discrete steps: Scoping – What network segments should I analyze? Discovery – What devices are out there? Port Scanning – What “ports” on the devices are “open” and willing to converse on? Vulnerability Detection – For the “services” (generally OS layer applications (e.g., telnet)) discovered are there problems with the configuration or version of that software that make it vulnerable? Advanced Techniques – Credentialed Scanning, Content Scans, etc. Reporting – Communicating the results of the NVA – preferably in a manner that is: Readily understood by management and technical resources Easily interpreted Actionable
Key Decision Points: Scoping Scoping (which/how many systems/network segments) and Extent/Rigor (what level of sampling and how in depth the scan is) is always based on objective of the test and should be proportional to risk Significant benefit to sampling across system types, network segments by function/geography to reduce data overload but gain representative data Scanning a statistically relevant lower number of systems with greater depth maximizes assurance  Leverage the information gained in the statistical sampling across the entire environment during the mitigation phase If warranted, post mitigation run a secondary “confirmatory” scan across  a different or wider sampling to confirm the efficacy of the mitigation efforts and provide a higher level of assruance.
Key Decision Points: The Discovery Phase Black/Grey/White Hat Posture: Unless one of the objectives of the activity is to validate that obfuscation/cloaking efforts are successful there are significant benefits to White Hat (providing the group conducting the scan the addresses to be scanned) It is less time consuming/expensive It is more accurate  For example, many VA Scanners will do a simple “ping” test to discover hosts which will miss any Windows XP desktop running the Windows Firewall
Key Decision Points: Port Scanning Ports are “addresses” that different services (applications) listen/process input on By default, many Vulnerability Scans will only be run on those ports that are commonly used or assigned ports (0 thru 1024) This approach saves time but will miss vulnerabilities in any applications using other ports including malware and back-doors as there are 65,535 ports By default, many Vulnerability Scans will only be run on TCP ports This approach saves time but will miss vulnerabilities associated with all services that respond on UDP as well If you run a high risk environment, will be scanning through a firewall, or are testing your incident response – you may want to incorporate more advanced port scanning methods (e.g., TCP FIN scans) to maximize the level of assurance that you achieve from your testing
Key Decision Points: Vulnerability Detection Operating Systems and applications/versions are inferred by the answers the host gives to the scanner By default, most scanners are set to “trust” the answers and act accordingly This can significantly reduce the assurance provided as the hosts may (un) intentionally give the vulnerability scanner bad  information (e.g., I'm running an Apache Web Server -when it is actually running IIS) as a trusting scanner will not look for IIS Vulnerabilities at that point Running in a “don’t trust the answers you get mode” increases the accuracy/assurance that you receive from an NVA Scanners only scan based on the library of OS, application, and vulnerability signatures that it is aware of Use a well regarded scanner and ensure that it is updated immediately before the scan takes place Some vulnerability checks have a higher probability of negatively impacting systems so defining if these checks should be run is critical
Key Decision Points: Vulnerability Detection If one of the objectives of a vulnerability scan is to gauge the effectiveness of an organizations Incident Detection and Incident Response Programs or Intrusion Prevention systems By default, most scanners are set to maximize speed Open as many connections to as many machines in the shortest time frame possible This makes them very “noisy” and easily detected /blocked Where assurance regarding Incident Detection /Prevention is intended a phased approach initiated from a a covert modality (intended to hide scanning activities by spreading them over greater periods of time and employing cloaking/evasive countermeasures) and gradually decrementing the evasiveness level is required For maximum assurance it is best to run Vulnerability Assessments with the IPS system in place and disabled Assurance that the IPS is operating as intended Assurance that if the IPS should fail or be evaded that the other security mechanisms are operating as intended
Key Decision Points: Advanced Techniques  Key new capabilities introduced in ‘08 & ‘09 Credentialed Scans Content Scans Passive Scans
Key Decision Points: Credentialed Scanning   Credentialed scans run as an administrative level user Much more accurate – Applications/version can be exactly determined Much greater depth – Can see patch history, system logging settings, full password settings) Can measure compliance against a standard (e.g., CIS, PCI, or corporate)  Greater time/cost to run generally offset by the reduction in false positives and simplified remediation
Key Decision Points: Content Scanning   Because a Credentialed scans run as an administrative level user we can extend it to look at the “content” Does the machine contain? Credit Card Data, Pornography, Medical Records, Social Security Numbers, Customer Records, Intellectual Property Can measure compliance against relevant standards  HIPAA, PCI, Sarbanes Oxley, Identify Theft Regulations  Greater time/cost to run generally offset by the increased assurance
Key Decision Points: Passive Scanning   Standard NVA’s are “active” in that they are based on inquiry and response NVA’s can crash services or systems In “mission critical” environments (e.g., a power plant or bank trading floor) this risk may not be acceptable Passive Scanning does not “inject” any traffic into the network – it just listens (sniffs)  to existing traffic Provides assurance in an environment without any risk of disrupting service Only identifies vulnerabilities for services that are actively communicating Greater time/cost  to run generally offset by gathering assurance where it was previously not feasible
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points

Weitere ähnliche Inhalte

Was ist angesagt?

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security EngineeringMarco Morana
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureDavid Sweigert
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkAndrew Gerber
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testingAbu Sadat Mohammed Yasin
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessmentprimeteacher32
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisIan G
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Reportbtpsec
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Rishabh Upadhyay
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingRaghav Bisht
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemLancope, Inc.
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the CloudNetStandard
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software developmentBill Ross
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveyEdgar Alejandro Villegas
 

Was ist angesagt? (20)

Software Security Engineering
Software Security EngineeringSoftware Security Engineering
Software Security Engineering
 
Sample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructureSample penetration testing agreement for core infrastructure
Sample penetration testing agreement for core infrastructure
 
Pen test methodology
Pen test methodologyPen test methodology
Pen test methodology
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Vulnerability assessment and penetration testing
Vulnerability assessment and penetration testingVulnerability assessment and penetration testing
Vulnerability assessment and penetration testing
 
Vulnerability Assessment
Vulnerability AssessmentVulnerability Assessment
Vulnerability Assessment
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
Btpsec Sample Penetration Test Report
Btpsec Sample Penetration Test ReportBtpsec Sample Penetration Test Report
Btpsec Sample Penetration Test Report
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report Vulnerability Assessment and Penetration Testing Report
Vulnerability Assessment and Penetration Testing Report
 
Introduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration TestingIntroduction To Vulnerability Assessment & Penetration Testing
Introduction To Vulnerability Assessment & Penetration Testing
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 
VAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant maliVAPT, Ethical Hacking and Laws in India by prashant mali
VAPT, Ethical Hacking and Laws in India by prashant mali
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 

Ähnlich wie Network Vulnerability Assessment: Key Decision Points

Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperTawnia Beckwith
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration TestingKiwiQA
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfSecurityGen1
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenSecurityGen1
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurity Gen
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurityGen1
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecurityGen1
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingElanusTechnologies
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21koolkampus
 

Ähnlich wie Network Vulnerability Assessment: Key Decision Points (20)

Web application Testing
Web application TestingWeb application Testing
Web application Testing
 
Getting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paperGetting the Most Value from VM and Compliance Programs white paper
Getting the Most Value from VM and Compliance Programs white paper
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Assessing network security
Assessing network securityAssessing network security
Assessing network security
 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Phases of Penetration Testing
Phases of Penetration TestingPhases of Penetration Testing
Phases of Penetration Testing
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
Software testing overview subbu
Software testing overview subbuSoftware testing overview subbu
Software testing overview subbu
 
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdfElevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
Elevating Connectivity Exploring - Telecom Security Monitoring Solutions.pdf
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Telecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGenTelecom Network Incident Investigation Services - SecurityGen
Telecom Network Incident Investigation Services - SecurityGen
 
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdfSecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
SecurityGen Telecom network security assessment - legacy versus BAS (1).pdf
 
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdfSecurity Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
Security Gen's Telecom Security Monitoring Unleashes Unrivaled Protection.pdf
 
Secure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security SolutionsSecure Horizons: Navigating the Future with Network Security Solutions
Secure Horizons: Navigating the Future with Network Security Solutions
 
Infrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration TestingInfrastructure & Network Vulnerability Assessment and Penetration Testing
Infrastructure & Network Vulnerability Assessment and Penetration Testing
 
Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21Critical System Validation in Software Engineering SE21
Critical System Validation in Software Engineering SE21
 
Information Security 201
Information Security 201Information Security 201
Information Security 201
 
NSA and PT
NSA and PTNSA and PT
NSA and PT
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Network Vulnerability Assessment: Key Decision Points

  • 1. Maximum Assurance: Key Decision Points for Network Vulnerability Assessments from the Maximum Assurance Series
  • 2. Objective The Maximum Assurance presentations are intended to unambiguously define and provide guidance on key decision points for Security Assessment activities that an organization may use to gain assurance to their security posture Terms Used to Communicate Activities Methodology (actions/steps/rationale) Scope (matching activity to objective) Key Decision Points Value Proposition (Assurance level)
  • 3. Quick Overview: Network Vulnerability Assessment (NVA) Systematic examination of network attached devices (e.g., computer, router) to identify vulnerabilities in design/ configuration that may cause negative impact Vulnerabilities generally result from default configuration weakness, configuration errors, security holes in applications, missing patches NVA’s are often the first step in a Penetration Test but may also be used as a stand-alone test NVA’s provide significant value for both public and private networks/systems NVA’s are conducted by a network scanner (a purpose built computer) and generally include very little human involvement NVA’s are a good way to rapidly assess the efficacy of your vulnerability management program (e.g., patch/configuration management) NVA’s are prone to false positives NVA’s can provide a staggeringly high amount of information in a moderate or larger environment
  • 4. Discrete Components of an NVA An NVA actually incorporates a number of discrete steps: Scoping – What network segments should I analyze? Discovery – What devices are out there? Port Scanning – What “ports” on the devices are “open” and willing to converse on? Vulnerability Detection – For the “services” (generally OS layer applications (e.g., telnet)) discovered are there problems with the configuration or version of that software that make it vulnerable? Advanced Techniques – Credentialed Scanning, Content Scans, etc. Reporting – Communicating the results of the NVA – preferably in a manner that is: Readily understood by management and technical resources Easily interpreted Actionable
  • 5. Key Decision Points: Scoping Scoping (which/how many systems/network segments) and Extent/Rigor (what level of sampling and how in depth the scan is) is always based on objective of the test and should be proportional to risk Significant benefit to sampling across system types, network segments by function/geography to reduce data overload but gain representative data Scanning a statistically relevant lower number of systems with greater depth maximizes assurance Leverage the information gained in the statistical sampling across the entire environment during the mitigation phase If warranted, post mitigation run a secondary “confirmatory” scan across a different or wider sampling to confirm the efficacy of the mitigation efforts and provide a higher level of assruance.
  • 6. Key Decision Points: The Discovery Phase Black/Grey/White Hat Posture: Unless one of the objectives of the activity is to validate that obfuscation/cloaking efforts are successful there are significant benefits to White Hat (providing the group conducting the scan the addresses to be scanned) It is less time consuming/expensive It is more accurate For example, many VA Scanners will do a simple “ping” test to discover hosts which will miss any Windows XP desktop running the Windows Firewall
  • 7. Key Decision Points: Port Scanning Ports are “addresses” that different services (applications) listen/process input on By default, many Vulnerability Scans will only be run on those ports that are commonly used or assigned ports (0 thru 1024) This approach saves time but will miss vulnerabilities in any applications using other ports including malware and back-doors as there are 65,535 ports By default, many Vulnerability Scans will only be run on TCP ports This approach saves time but will miss vulnerabilities associated with all services that respond on UDP as well If you run a high risk environment, will be scanning through a firewall, or are testing your incident response – you may want to incorporate more advanced port scanning methods (e.g., TCP FIN scans) to maximize the level of assurance that you achieve from your testing
  • 8. Key Decision Points: Vulnerability Detection Operating Systems and applications/versions are inferred by the answers the host gives to the scanner By default, most scanners are set to “trust” the answers and act accordingly This can significantly reduce the assurance provided as the hosts may (un) intentionally give the vulnerability scanner bad information (e.g., I'm running an Apache Web Server -when it is actually running IIS) as a trusting scanner will not look for IIS Vulnerabilities at that point Running in a “don’t trust the answers you get mode” increases the accuracy/assurance that you receive from an NVA Scanners only scan based on the library of OS, application, and vulnerability signatures that it is aware of Use a well regarded scanner and ensure that it is updated immediately before the scan takes place Some vulnerability checks have a higher probability of negatively impacting systems so defining if these checks should be run is critical
  • 9. Key Decision Points: Vulnerability Detection If one of the objectives of a vulnerability scan is to gauge the effectiveness of an organizations Incident Detection and Incident Response Programs or Intrusion Prevention systems By default, most scanners are set to maximize speed Open as many connections to as many machines in the shortest time frame possible This makes them very “noisy” and easily detected /blocked Where assurance regarding Incident Detection /Prevention is intended a phased approach initiated from a a covert modality (intended to hide scanning activities by spreading them over greater periods of time and employing cloaking/evasive countermeasures) and gradually decrementing the evasiveness level is required For maximum assurance it is best to run Vulnerability Assessments with the IPS system in place and disabled Assurance that the IPS is operating as intended Assurance that if the IPS should fail or be evaded that the other security mechanisms are operating as intended
  • 10. Key Decision Points: Advanced Techniques Key new capabilities introduced in ‘08 & ‘09 Credentialed Scans Content Scans Passive Scans
  • 11. Key Decision Points: Credentialed Scanning Credentialed scans run as an administrative level user Much more accurate – Applications/version can be exactly determined Much greater depth – Can see patch history, system logging settings, full password settings) Can measure compliance against a standard (e.g., CIS, PCI, or corporate) Greater time/cost to run generally offset by the reduction in false positives and simplified remediation
  • 12. Key Decision Points: Content Scanning Because a Credentialed scans run as an administrative level user we can extend it to look at the “content” Does the machine contain? Credit Card Data, Pornography, Medical Records, Social Security Numbers, Customer Records, Intellectual Property Can measure compliance against relevant standards HIPAA, PCI, Sarbanes Oxley, Identify Theft Regulations Greater time/cost to run generally offset by the increased assurance
  • 13. Key Decision Points: Passive Scanning Standard NVA’s are “active” in that they are based on inquiry and response NVA’s can crash services or systems In “mission critical” environments (e.g., a power plant or bank trading floor) this risk may not be acceptable Passive Scanning does not “inject” any traffic into the network – it just listens (sniffs) to existing traffic Provides assurance in an environment without any risk of disrupting service Only identifies vulnerabilities for services that are actively communicating Greater time/cost to run generally offset by gathering assurance where it was previously not feasible