CERT InGuidelineforAuditee
CERT InGuidelineforAuditee
IT Security Auditing
Guidelines for Auditee Organizations
Version 3.0
Indian Computer Emergency Response Team
A. INTRODUCTION
IT Security auditing assignments can take many different forms depending upon the type
and size of auditee organization. It is suggested that audit contracts be finalized only upon
consultation with auditee’s legal/contractual experts and after negotiations with the
auditor. IT security auditing can be conducted as a separate activity or as part of the risk
assessment process under the risk management program.
The auditor will need clear and unambiguous direction from auditee management (written
rules of engagement), clearly defined scope for security audit and input on what is required
for planning & assessment, requirement analysis, test execution & analysis, results and
documentation.
B.1 Introduction
Identifies the purpose, participants (auditee & auditor organization and any
other),Technical team(both auditee and auditing organization), Briefing schedule
and audit scope definition.
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 1|P a ge
Indian Computer Emergency Response Team
Please Note:
“Auditing Man day” shall mean auditing effort (both on-site as well as off-site) of
minimum 8 hours, excluding breaks, by a person with suitable auditor qualification
such as CISA/CISSP/BS 7799 Lead Assessor/ISA or any other formal security auditor
qualification.
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 2|P a ge
Indian Computer Emergency Response Team
B.3.2.3If necessary for privileged testing, the auditee must only provide
temporary access tokens , login credentials, certificates, secure
ID numbers etc. and ensure that privilege is removed after the
audit.
B.3.2.6 There should be a well defined escalation matrix both for the
auditee and auditing organization for addressing any problem
encountered during the audit process which should be shared
with respective authorities.
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 3|P a ge
Indian Computer Emergency Response Team
C.AUDITEE EXPECTATIONS
C.1 Verifying possible vulnerable services only with explicit written permission from
the auditee.
C.2 Auditors must verify the existing policies of the organization against the industry
standards and best practices and suggest the necessary improvements if required.
C.3 Refrain from security testing of obviously highly insecure and unstable systems,
locations, and processes until the security has been put in place.
C.4 A formal Confidentiality & Non-disclosure agreement should be signed by the IT
Security auditing organization prior to commencing the cyber security auditing
work. The auditing organization and its auditors are ethically bound to maintain
confidentiality, non-disclosure of auditee information, and security testing results.
C.5 The security auditor always assumes a limited amount of liability as per
responsibility. Acceptable limited liability could be equal to the cost of service
(this includes both malicious and non-malicious errors and project
mismanagement).
C.6 Clarity in explaining the limits and dangers of the security test.
C.7 In the case of remote testing, the origin of the testers by telephone numbers
and/or IP addresses is made known and a formal written permission with a clear
definition of the tasks to be performed should be taken.
C.8 Seeking specific permissions for tests involving survivability failures, denial of
service, process testing, or social engineering.
C.9 The scope is clearly defined contractually before verifying vulnerable services.
C.10 The scope clearly explains the limits of the security test.
C.11 The test plan includes both calendar time and man-hours.
C.12 The test plan includes hours of testing.
C.13 The security auditors know their tools, where the tools came from, how the tools
work, and have them tested in a restricted test area before using the tools on the
customer organization and the result of such testing should be approved formally
by the authorized person of auditee organization.
C.14 The exploitation of Denial of Service tests is done only with explicit permission.
C.15 Social engineering and process testing are performed in non-identifying statistical
means against untrained or non-security personnel.
C.16 Social engineering and process testing are performed on personnel identified in
the scope and may not include customers, partners, associates, or other external
entities.
C.17 High risk vulnerabilities such as discovered breaches, vulnerabilities with known,
high exploitation rates, vulnerabilities which are exploitable for full, unmonitored
or untraceable access, or which may put immediate lives at risk, discovered during
testing are reported immediately to the customer with a practical solution as soon
as they are found.
C.18 Refrain from carrying out Distributed Denial of Service testing over the Internet.
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 4|P a ge
Indian Computer Emergency Response Team
C.19 Refrain from any form of flood testing where a person, network, system, or
service, is overwhelmed from a larger and stronger source.
C.20 Notify the auditee whenever the auditor changes the auditing plan, changes the
source test venue, has high risk findings, previous to running new, high risk or
high traffic tests, and if any testing problems have occurred. Additionally, the
customer is notified with progress updates at reasonable intervals.
C.21 Reports include all unknowns clearly marked as unknowns.
C.22 All conclusion should be clearly stated in the report with the clear objective
evidence for each conclusion drawn.
C.23 Reports use only qualitative metrics for gauging risks based on industry-accepted
methods.
C.24 Auditee is notified when the report is being sent as to expect its arrival and to
confirm receipt of delivery.
C.25 All communication channels for delivery of report are end to end confidential.
D. GENERAL GUIDELINES
D.1 Auditee must implement the guidelines and advisories issued by CERT-In and/or
suitable Government Agency time to time in their auditing program.
D.2 Regular interaction framework during audit should be setup.
D.3 Auditee should interview manpower deployed by auditor for conducting the
audit.
D.4 Ensure that auditor is utilizing industry standard methodologies, best practices
for security testing.
D.5 Scope of audit (in case of VA/PT) should not be limited to the few lists like
OWASP top 10 or SANS Top 25 programming errors, it must include discovery of
all known vulnerabilities.
D.6 Auditee must demand for the working notes upon completion of the audit
(provisions for this must be made in the audit contract itself) and should ask for
audit evidences collected to be submitted as appendix along with the final audit
report.
D.7 Audit report format should be mutually agreed upon (Auditee and Auditor) and
finalized before commencement of the audit. A sample web-application audit
report for reference is available at Annexure-I.
D.8 Regular meetings should be held between the auditor and auditee
representatives (SPOCs) to review the progress of the audit in order to assess
and improve the audit efficiency.
D.9 Auditee must ensure that the tests agreed upon in the audit contract are actually
being conducted by the auditor and also that the prescribed timeline is being
followed, through the aforementioned meetings.
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 5|P a ge
Indian Computer Emergency Response Team
D.10 CERT-In empanelled auditors are selected after much scrutiny and testing but it
is vital to understand that while the list of empanelled auditors is true and
accurate, CERT-In cannot guarantee the authenticity of audit details provided by
these organizations.
D.11 While selecting an auditor, it is the responsibility of the auditee to check the
domain audit conducted, previous audits conducted and other relevant details.
An auditee should have a clear understanding of the auditor’s audit
methodology, tools use, experience in the relevant domain and all available
alternatives like other competent organizations before selecting.
D.12 If the credibility of the auditor is unclear, auditee must make sure that the
contractual agreement allows the auditee to stop the audit and choose another
auditor within a reasonable duration of time in order to avoid financial losses on
both ends.
D.13 Feedbacks/complaints to CERT-In help improve the quality of selecting auditing
organizations in future, thus, it is both an auditee’s right and duty to provide
relevant feedbacks. All feedbacks/complaints are kept confidential and are acted
upon promptly with utmost importance.
D.14 Last but not least, the auditee must act upon the relevant audit findings and
strive to improve the IT security.
The information provided on the CERT-In website can help the auditee organization with
respect to the following:
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 6|P a ge
Indian Computer Emergency Response Team
However, since the data / software related to the web-site are under the control of the
organization owning the contents of the website, their responsibility is limited to get these
audited by a CERT-In empanelled information security auditing organization.
The organization, owning the website contents, can select any auditing organization out of
the CERT-In empanelled information security auditing organizations as per their office
rules & procedures and financial guidelines to get these audited. The information security
audit report from the information security auditor should clearly state that these
webpages, including the backend database and scripts, if any, are free from any
vulnerability and malicious code, which could be exploited to compromise and gain
unauthorized access with escalated privileges into the webserver system hosting the said
website.
Auditing process is aimed for the continual improvement of the auditee organization and
thus the auditor perspective should be aimed at refining the security process rather than
merely complying with the standard against which the auditing is done. The Auditing
organization must maintain a relationship with the auditee even after the completion of the
audit process to keep auditee organization updated for the latest security developments
and to help in implementing the secure environment.
G. DISCLAIMER
The outline provided here must be treated only as a guide/standard format by the auditee;
the specific formats and terms & conditions of auditors will be unique for each
organization.
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 7|P a ge
Indian Computer Emergency Response Team
Annexure-I
Report Handed over to (Name and contact details of person from auditee
organization):
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 8|P a ge
Indian Computer Emergency Response Team
I. Executive summary:
Section-I
Section-II
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 9|P a ge
Indian Computer Emergency Response Team
Section-I
Vulnerable Point-1/2/3…./n
a. Vulnerable Point:
b. Name of Vulnerability:
c. Steps of verification of vulnerability(Proof of concept) with
screenshots:
Penetration-I/II/III/IV:
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 10 | P a g e
Indian Computer Emergency Response Team
Version 3.0: IT Security Auditing: Guidelines for Auditee Organizations -April, 2013 11 | P a g e