Ebook CISSP Domain 06 Security Assessment and Testing
Ebook CISSP Domain 06 Security Assessment and Testing
Audit
First-party Second-party
• Internal audit for and by
the organization itself External audit done by
customers, regulators, or any
• Used to confirm or
external party with a formal
improve the effectiveness
interest in an organization
of management systems
Third-party
External audit performed by
independent organizations
such as registrars (certification
bodies) or regulators
Audit Strategy
Audit • The scope of the audit should be determined in coordination with business unit
strategies: managers.
• The business unit managers should be included early in the audit planning process and
should be engaged throughout the audit life cycle.
Goal Scope
Determine the goal Determine the scope
of the audit of the assessment
02 04
Audit Process
05 07 Communicate
Conduct the audit Communicate to the right
Stick to the plan and leaders in order to achieve
document deviations and sustain a strong
security posture
Effect
The difference between Recommendation
04 05 Action that must be taken
and significance of the
condition and the criteria to correct the cause
Criteria
Cause
Standards used to measure
02 03 Explanation of why a
the activity or performance
problem occurred
of the auditee
Condition
01 Statement that describes
the results of the audit
Assessments
Each of the following types of SOC report is designed to help service organizations meet
specific user needs:
SOC 3 Report
SOC 2 Report
SOC 1 Report
SOC 1 Report
The report on controls at a service organization relevant to user entities’ internal control over financial
reporting is prepared according to the Statement on Standards for Attestation Engagements (SSAE) 18
and is an enhancement to the previous standard for Reporting on Controls, the SAS 70.
Type 1: Evaluates and reports Type 2: Includes the design and testing
on the design of controls put of controls to report on their
into operation on a certain date operational effectiveness over a period
(typically six months)
This is a report on controls at a service organization relevant to security, availability, processing integrity,
confidentiality, or privacy. An SOC 2 report has the same options as the SSAE 16 report where a service
organization can decide to go under a Type 1 or Type 2 audit. The criteria for these engagements are
contained in the Trust Services Principles Criteria and Illustrations.
Use of these reports is generally restricted and is at the discretion of the auditor
using the guidance outlined in the standard.
SOC 2 Reports
SOC 2 is based on Trust Criteria modeled around four broad areas: Policies, Communications,
Procedures, and Monitoring. The Principles and Criteria are jointly set by the AICPA and Canadian CPAs.
The Trust Services Criteria are:
Availability The system is available for operation and use as committed to or agreed
upon.
Processing Integrity System processing is complete, valid, accurate, timely, and authorized.
REPORT
PRUPOSE INTENDED USERS FOCUS ON EVALUATES
TYPE
Design internal Control
Audit of Financial Statements Internal controls
Operating effectiveness
SOC 1 Financial Auditors, Customers, relevant to Financial Type I Type II
of internal Control
Statements Related third parties Reporting
during review period
Operational controls Design internal Control
GRC
Management, regarding security, Operating effectiveness
Programs, Type I Type II
SOC 2 Regulators, Related availability, processing of internal Control
Oversight,
third parties integrity, confidentiality during review period
Due diligence
or privacy
Anyone with a need
Marketing or Design of controls
for confidence in Easy to read report on
SOC 3 General General related to SOC2
service organizations controls
purpose objectives
controls
The purpose of internal assessment is to determine if the security controls meet the
organization’s risk expectations.
Prepare and
Perform present Remediate
Create a charter findings
assessment assessment
report
Charter
The scope of the assessment will address physical, technical, and administrative controls, including
the people, processes, and technologies used to support the business. There are two kinds of
assessments based on the scope:
The results of internal assessment may identify areas where corrective actions or improvement is
warranted.
• The timetable for remediation of the audit findings should be agreed upon.
• Issues identified should be prioritized and fixed during the assessment.
• Internal assessment should be subject to continual process improvement.
Plan of Action and Milestones (POAM) is a document that identifies tasks for remediation. It details
resources required to accomplish the elements of the plan, any milestones in meeting the tasks, and
scheduled completion dates for the milestones.
External Audit and Assessment
An audit is an assessment
performed by an independent Non-compliance could
third-party to demonstrate that result in fines, litigations,
the organization’s controls and limitations on business
practices meet a compliance activities, or other
standard. consequences.
Types of Audits
Functionality
Functional audit IT governance alignment
Performance
IS Audit Internal controls effectiveness
Information systems security
Electronic devices Computer Forensic audit
Regulatory
3rd party service audit Compliance Audit
Industry-specific standards
Fraud audit Specialized Audit Types of Audits
Forensic audit
Financial Audit Financial records integrity
Audit planning
Perform audit
Audit planning is an important activity for both internal and external audits.
There are four principles of supply chain security. They are explained below:
There are four principles of supply chain security. They are explained below:
• Build assurance activities into your approach to managing your supply chain
Vulnerability
Vulnerability Vulnerability assessment assessment objectives
2 4
Assign a quantifiable Develop a strategy to
level of importance to mitigate or eliminate the
the resources identified most serious vulnerabilities
of the most valuable
resources
Types of Vulnerability Assessments
Network discovery
Network scan
discovery scan ToolsTools commonly
commonly usedused
TCP connect
TCP SYN scanning TCP ACK scanning Xmas scanning
scanning
• Sends a single packet • Opens a full • Sends a packet with • Sends a packet with
to each scanned port connection to a the ACK flag set, the FIN, PSH, and
with the SYN packet remote system on indicating that it is URG flags set
set the specified port part of an open
• If it receives a • Used when the user connection
response with SYN running the scan
and ACK flags set, does not have
this indicates the necessary
port is open at the permissions to run a
sender’s end half-open scan
• This is also called
half-open scanning
Network Vulnerability Scan
Tools used
Web Vulnerability Scan
Ideal scenarios
Enumeration Exploitation
Performing port scans Attempting to gain
and resource unauthorized access by
identification methods exploiting vulnerabilities
Targeted
Penetration or Vulnerability Testing Types
Targeted
Penetration or Vulnerability Testing Types
Targeted
Penetration or Vulnerability Testing Types
Gray-box testing (partial • The tester only has publicly available data to work with.
knowledge)
• The network security team has prior knowledge of this test to
Targeted
Penetration or Vulnerability Testing Types
Gray-box testing (partial • It is a blind test to both the tester as well as the security team.
knowledge) • It is used to evaluate the security levels and responses of the
security team.
Blind tests
• It is a realistic demonstration of the likely success or failure of an
attack.
Double blind types
Targeted
Penetration or Vulnerability Testing Types
Targeted
Log Management and Review
Log management is the collective processes and policies used to administer and facilitate the
generation, transmission, analysis, storage, archiving, and ultimate disposal of the large volumes of
log data created within an information system.
System logs are examined to Key requirement for an NTP is the protocol for
detect security events or verify effective log review is the time time synchronization
effectiveness of security synchronization across all the (UDP 123).
controls. log sources.
Log Management Phases
Log generation Log transmission Log storage Log analysis Log disposal
It is vital to maintain the integrity of log data. Here are the methods to prevent it from being tampered:
Remote Putting a log file into another device will protect it from being tampered with in a
Logging compromised system
Write-Once
Using write-once media to prevent unauthorized modifications to log files
Media
Cryptographic
Powerful technique for ensuring unauthorized modifications are easily noticed
Hash
Log Management: Advantages and Challenges
Advantages Challenges
Real Transaction
Synthetic Transaction
Real User
Real Monitoring (RUM)(RUM)
User Monitoring Synthetic
Synthetic Transaction
Transaction
• RUM is a passive monitoring technology • Actions performed on monitored objects in
which determines if users are being served real time are called synthetic transactions.
correctly and quickly. • Synthetic performance monitoring is proactive
• It records all user interaction with a website and involves external agents running scripted
or client interaction with a cloud-based transactions against a web application.
application or server. • In synthetic transactions, real user sessions
• It accurately captures the actual user are not tracked.
experience. • Some of the tools used are Microsoft System
• It tends to produce noisy data and thus may Center Operations Manager, Foglight
require more back-end analysis. Transaction Recorder.
• It lacks the elements of predictability and • Some examples of functionalities are monitor
regularity, which could mean that a problem websites, databases, and TCP ports.
won't be detected during low utilization
periods.
Security Testing in the SDLC
Manual Automatic
Static Dynamic
• Type of application
• Attack surface
• Technologies supported
• Quality of results and usability
• Performance
• Resource utilization
Software Product Testing Levels
Integration
Unit Testing
Testing
User Acceptance
Testing
Code Review and Testing
Misconfiguration
Fagan Code Review Process
• Fagan inspection is a process of trying to find defects in documents such as the source code
or formal specifications during various phases of the software development process.
• It is named after Michael Fagan who is credited with being the inventor of formal software
inspections.
• This level of formality is normally found only in highly restrictive environments where code
flaws may have a catastrophic impact.
Static Testing
Dynamic Testing
Fuzz testing is a specialized dynamic testing technique that provides different inputs to software to
stress their limits and find previously unknown flaws.
• Takes previous input values from • Develops data models and creates
actual operations of the software new fuzzed input based on an
and manipulates them to create understanding of the types of data
fuzzed input used by the program
• Might alter the characters of the • Example: Peach Fuzzing Platform
content and append strings
• Example: ZZUF tool automates the
process of mutation fuzzing
Use Case Testing or Positive Testing
Make
• Use cases are textual but are graphically purchase
represented using the Unified Modeling <<include>>
Identity Provider
Language (UML).
Complete
• Use cases are related to one another in a Customer Checkout
• Misuse case is a use case that includes threat actors and the actions they want to perform on a
system.
• Under UML, threat actors are represented as stick figures with shaded heads and their actions
are depicted as shaded ovals.
• The misuse case is meant to threaten a specific portion or an illegitimate use case of the system.
• Misuse case testing helps to ensure one has effectively addressed each of the risks identified and
has decided to mitigate them during the risk assessment phase.
• A misuse case doesn’t require including all the possible threats to the system, but it should
include the ones which had to be addressed.
• Misuse cases are used by software developers to evaluate the vulnerability of their software to
known risks.
Misuse Case or Abuse Case Testing
Correspondence
Allowed number of between data and
Web session testing
characters field types
Use Case vs. Misuse Case
Test coverage involves a set of test cases written against the requirement specification.
• Test groups may refer to a percentage of the test cases that were run, passed, or failed.
• These are referred to as test coverage metrics.
• QA groups often use test coverage to implement test metrics according to the test plan.
• It is practically impossible to completely test a software.
• Testing professionals conduct test coverage analysis to estimate the degree of testing
conducted against the new software.
Code coverage refers to how well the test set is covering the source code. That is, to what extent is the
source code covered by the set of test cases.
An interface is an exchange point of data between the system and the user.
Gartner defines Breach and attack Simulation (BAS) as tools “that allow enterprises to
continually and consistently simulate the full attack cycle (including insider threats, lateral
movement and data exfiltration) against enterprise infrastructure, using software agents, virtual
machines, and other means”.
BAS testing mimics real-world attack scenarios to help organizations test and measure the
effectiveness of their security controls and staff.
Key capabilities and functions of BAS:
• Can be deployed on-premise or on cloud
• Provides continuous, on-demand, or periodic testing
• Covers all phases of an attack, from pre-exploitation to post-exploitation, persistence,
and maintaining access
• Includes testing for both perimeter and internal security controls
• Comprehensive reports include recommendations for mitigation
Compliance Checks
It is a process by which
the performance of ISO 27004 deals with KPI
security controls and metrics.
processes is measured.
Organizations should try to adopt a continuous process improvement model, such as the Deming
(PDCA) cycle, to improve their security posture.
Google’s Project Zero is a team of dedicated security analysts tasked with finding zero-day
vulnerabilities. Project Zero was announced on July 15, 2014, on Google's security blog.
Project Zero has been responsible for identifying serious security flaws such as Meltdown and
Spectre.
Bugs found by the Project Zero team are reported to the vendor and made publicly available only
after 90 days from the day the bug is discovered.
If the vulnerabilities are patched within 90 days, technical details are disclosed 30 days after the
release of a fix to give users time to install the patch.
The 90-day deadline is Google's way of implementing responsible disclosure, giving vendors 90 days
to fix a problem before informing the public so that users themselves can take the necessary steps
to avoid attacks.
Various tools and techniques are used to identify and mitigate risks
due to design flaws, architectural issues, hardware and software
vulnerabilities, coding errors, and other weaknesses.