Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update
|
|
|
- Marjorie Copeland
- 10 years ago
- Views:
Transcription
1 Pension Benefit Guaranty Corporation Office of Inspector General Evaluation Report Penetration Testing An Update August 28, /
2 Penetration Testing 2001 An Update Evaluation Report / TABLE OF CONTENTS Page EXECUTIVE SUMMARY... iii OVERVIEW... 1 SCOPE... 1 METHODOLOGY... Phase I: External Network Penetration... Phase II: Internal Network Penetration... WORK STANDARDS AND LIMITATIONS... PENETRATION TESTING RESULTS Internet Security Dial-In Security Network Security Physical Security Social Engineering... 6 ASSESSMENT OF STRENGTHS... ASSESSMENT OF WEAKNESSES... RECOMMENDATIONS AGENCY COMMENTS... TAB 1 Abbreviations LAN Local Area Network NDS Novell Directory Services Novell Novell Network Operating System NT Microsoft Windows NT Operating System OIG Office of Inspector General PBGC Pension Benefit Guaranty Corporation UNIX UNIX Operating System -i-
3 Penetration Testing 2001 An Update Evaluation Report / EXECUTIVE SUMMARY In January 2001, the Office of Inspector General (OIG) conducted a penetration test of the Pension Benefit Guaranty Corporation s (PBGC) network security. This was follow-up testing of computer security we conducted in In October 1999, the OIG issued a report of the results of penetration testing activities on components of PBGC s information technology. We found significant computer security vulnerabilities, and notified PBGC we would retest the identified weaknesses. The OIG engaged the PricewaterhouseCoopers Technology Security group (hereafter, the penetration team ) to focus on gaining access to PBGC systems and resources and escalating privileges on those systems. Throughout the testing, our penetration team attempted to gain the highest level of access possible (administrator) on PBGC systems without performing malicious actions or interrupting existing PBGC services. Our penetration testing found that PBGC significantly improved it security over network resources to provide protection from malicious external and insider attacks. Our team did find some areas in which PBGC should improve its security that are similar to our 1999 findings. 9 We found that not all PBGC accounts have strong passwords. The team was able to obtain user-level access on PBGC s main Windows NT domain and on PBGC Novell using accounts with either no password or with the password set to the account name. The team was also able to login with administrator-level privileges to a contractor-operated Novell tree within the PBGC network using an account without a password. However, the team could not exploit the access to this tree to gain entry to the main PBGC Novell Directory Service. 9 We also found that PBGC employees are allowing unauthorized personnel access to PBGC office areas. Recommendations We recommend that PBGC develop a plan of action to prioritize and address the following strategic recommendations: Assign strong passwords to user level accounts with null passwords or passwords set to the account name in the Windows NT and Novell environment. (IRMD-125) Assign strong passwords to administrator level accounts with null passwords on the Contractor operated Novell Directory Service tree. (IRMD-126) Develop and publicize guidance for employees to monitor and report unauthorized personnel in PBGC office areas. (IRMD-127) We provided PBGC the opportunity to comment on this report. Those comments were generally favorable, and are attached at TAB 1. -ii-
4 Penetration Testing 2001 An Update Evaluation Report / OVERVIEW In October 1999, the OIG issued a report of the results of penetration testing activities on components of PBGC s information technology systems (see Penetration Testing 1999, OIG Report No / ). We found significant computer security vulnerabilities, including unauthorized access to PBGC mission-critical systems from remote locations and inside PBGC. For example, during our testing, we obtained the highest security privileges and were able to: Create, delete, and modify data, including financial and plan data; Access, read, and modify information on plan participants; and Deny service on critical PBGC network systems. We were able to achieve this level of access without being detected or reported. In that report, we notified PBGC we would retest the identified weaknesses. In January 2001, the Office of Inspector General (OIG) conducted a follow-up penetration test of the Pension Benefit Guaranty Corporation s (PBGC) network security. The OIG engaged the PricewaterhouseCoopers Technology Security group (hereafter, the penetration team ) to focus on gaining access to PBGC systems and resources. Throughout the testing, our penetration team attempted to gain the highest level of access possible (administrator) on PBGC systems without performing malicious actions or interrupting PBGC services. The penetration team performed the following activities: Internal and external penetration tests, including limited social engineering and physical security penetration attempts on PBGC information resources. Tests of the effectiveness of the corrective actions taken by PBGC in response to the findings of the testing performed by the penetration team in Identification of new vulnerabilities within the PBGC information technology environment. This testing continues the OIG s reviews over the past five years that focus on controls and security issues protecting PBGC information technology. SCOPE The scope of the penetration testing included: Attempting internal and external penetration of PBGC systems, including the PBGC firewall, web server, and router from the Internet, to determine whether infrastructure and data processing devices are at risk from unauthorized external intrusion; Attempting internal and external penetration through telephone modems and dial-in remote access systems located within PBGC to determine if the network was at risk of unauthorized external intrusion though telephone access; and -1-
5 Attempting internal penetration as an untrusted insider with physical access to the network infrastructure, and through social engineering, to determine if PBGC systems were vulnerable to misuse by malicious insiders. The penetration team used PricewaterhouseCoopers proprietary methodologies and common hacker software tools to identify network vulnerabilities. PBGC information systems security practices were compared against controls observed in industry to identify weaknesses and develop recommendations for improvements. The findings in this report are based on data collected at the time of testing at PBGC. They are a brief snapshot in time of our testing and do not reflect any changes made to the system after the data collection activity. METHODOLOGY Our methodology for penetration testing focused on gaining access to PBGC systems and resources, and escalating privileges on those systems. Throughout the testing, we attempted to gain the highest level of access possible (administrator) on PBGC systems without performing malicious actions or interrupting existing PBGC services or operations. Our goal was to gain administrator access on PBGC financial systems from both external and internal paths. Phase I: External Network Penetration Internet penetration testing This process tested the configuration, implementation, and security practices of PBGC's Internet connectivity and access controls, and attempted to identify and exploit security vulnerabilities in order to gain unauthorized access into PBGC networks or devices. The penetration team also retested the vulnerabilities found in 1999 to determine if corrective measures were in place. The testing included: 9 Analyzing a comprehensive footprint of Internet connections to identify PBGC systems connected to the Internet and services running. 9 Using stealth penetration tools and techniques to review the effectiveness of PBGC intrusion detection, monitoring, and incident response capabilities. Dial-in penetration testing This testing included attempts to gain network access via dial-in systems. The penetration team retested the vulnerabilities found in 1999 to determine if corrective measures were in place. The team identified and attempted to exploit dial-in access points through: 9 Using war-dialer software to identify modems within the range of the PBGC telephone exchanges. 9 Using known default accounts, specialized scripts, password guessers, and password cracking software to exploit the remote connections identified in the war dialing. -2-
6 Social engineering testing The penetration team scripted social engineering techniques to attempt to gain additional system information or generate a desired user action. The objective of the social engineering techniques was to test PBGC user security awareness and compliance with organizational security policies. The social engineering scenarios used included: 9 Calling the Help Desk posing as a computer-illiterate user and asking for the assignment of a new password. 9 Calling a PBGC user posing as a help-desk employee or systems administrator and convincing them to reveal their usernames or passwords. Phase II: Internal Network Penetration Physical penetration testing The penetration team attempted to gain unauthorized physical access to PBGC systems by circumventing or exploiting weaknesses in the physical security protecting network systems at PBGC. Our activities were limited to attempts at entering the building through the main entrance during business hours; locating open office areas or communications closets. Our goal was to gain unchallenged access to PBGC spaces and attempt to connect or log on the network through available resources. Insider penetration testing The team performed controlled insider penetration tests, in which we attempted to identify vulnerabilities to insider exploitation in order to gain unauthorized access or privileges on critical systems and data on the PBGC network. The insider testing evaluated PBGC s defenses against malicious individuals with internal access to PBGC facilities and systems. Specific steps included: 9 Attempting to gain network access without a valid user account. 9 Performing a detailed search and footprint analysis of internal network paths. 9 Conducting systematic attempts to gain unauthorized access and privileges via internal and trusted links by exploiting vulnerabilities and network services. 9 Analyzing vulnerabilities to exploit by attempting to map network topology; increasing level of privileges; obtaining access to password files, , and other sensitive data; and gaining access to other network segments or subnets. 9 Testing the intrusion detection and incident response actions. WORK STANDARDS AND LIMITATIONS This task was conducted in accordance with the Standards for Consulting Services established by the American Institute of Certified Public Accountants. Accordingly, in this report, we provide no opinion or other forms of assurance with respect to the systems reviewed. The testing provided a view of network security for PBGC at the time of the testing and does not reflect system conditions into the future. Due to the nature of information systems security, it does not ensure all vulnerabilities have been identified. -3-
7 PENETRATION TESTING RESULTS Our penetration testing found that PBGC significantly improved its security over network resources to provide protection from malicious external and insider attacks. The testing team was not able to access PBGC systems via external testing from the Internet or dial-in access points. Internal network penetration testing, social engineering, and physical security testing also failed to generate significant access to PBGC s systems. Internet Security Attempts to penetrate or bypass access controls on the firewall, web servers, and other Internet systems were unsuccessful. This means we did not gain unauthorized access to PBGC Internet systems or users electronic mail from the Internet. Through Internet penetration testing, we identified seven PBGC hosts with one high, three medium, and three low level vulnerabilities on these hosts. During manual testing of these vulnerabilities, the team was unable to exploit the high level vulnerability and one of the medium level vulnerabilities. The remaining identified vulnerabilities, while exploitable, would not allow an unauthorized user to gain control of the systems. Dial-In Security The penetration team s attempts to circumvent PBGC dial-in access controls were unsuccessful. Using a war-dialing program, the team was able to identify five modems in the PBGC exchange. One of these modems was linked to a non-pbgc organization and the other four modems appeared to be fax machines. The team was unable to gain access to PBGC network resources through the five modems. The team also attempted to penetrate the PBGC Wide Area Network using dial-in access points that were compromised during the 1999 testing. None of the modem numbers identified in 1999 were being used by PBGC; some were disconnected, and others were voice lines for non- PBGC organizations. Network Security Simulating an individual with physical access to the PBGC office spaces, the penetration team connected to the internal PBGC network and attempted to gain unauthorized access to the Windows NT, Novell, UNIX, and network devices. Unlike our testing in 1999, we could not: 9 gain administrator-level access to either the Novell and Windows NT environments, though we did gain user-level access by using accounts without passwords or with passwords set to the account name (see below); 9 gain access to PBGC UNIX systems or network devices (routers, switches, etc.); and 9 gain access to PBGC s production database applications (Oracle), including the Participant Records Information Systems Management System and the Premium Accounting System. -4-
8 Based on this testing, we found that PBGC improved its network security since 1999, and current security controls protect critical systems from unauthorized access and abuse originating from the internal network or from external sources. The penetration team, however, did identify the following vulnerabilities: 9 Novell We discovered user-level accounts without passwords and with passwords set to the account name on the PBGC Novell Directory Service (NDS). The NDS defines and organizes the components of the network -- e.g., users, files, and printers. Through these user-level accounts, the team was able to access the PBGC NDS and PBGC Novell servers. Additionally, the team was able to explore files and use native Novell programs to discover information about key users and servers. In addition, the penetration team gained administrator-level access to a contractoroperated NDS within the PBGC network using an account without a password. The contractor NDS is separate from the main PBGC NDS. This account provided the team full access to the PBGC NDS, and would have allowed them to add or delete users and modify files. Although the team could not gain access to the PBGC Novell tree using the administrator privileges from the contractor-operated NDS, we could read the files in the Contractor tree, including those pertaining to PBGC. Although PBGC may not be directly responsible for administering the servers on this tree, the supervisor level accounts without passwords should immediately be removed or assigned stronger passwords. 9 Windows NT The team was able to identify one user account with the password set to the account name on the Windows NT domain. Using this account, the team authenticated to the Primary Domain Controller, but could not access files on the system. The team was unable to elevate the account s access to the administrator level. The team was able to connect to ten Windows NT systems by using a null connection (no username or password). Using common hacker tools from the Internet and commands native to the Windows NT operating system, the team was able to extract user and group membership information from the systems. 9 UNIX The team found services running on UNIX systems that may not be needed, e.g., finger and r services. Finger and r services are part of the UNIX operating system that provide certain information such as users and log-ins. Using these services, the team obtained valid user account names. However, the team could not successfully exploit the accounts or services to gain access to UNIX systems. Physical Security The team s physical penetration efforts consisted of attempts to gain unauthorized physical access to PBGC network systems at 1200 K Street. PBGC s space is secured through locked hallway doors leading into office space that are opened by using an individually-assigned access card. During the physical security penetration testing, our team gained entry to the 10 th floor office space as an employee was exiting. This allowed the team to walk around the floor for some time before being questioned by a PBGC employee. -5-
9 The team also gained entry by following a PBGC employee into 9 th floor office space and walked around unchallenged for approximately fifteen minutes. During this period, the team entered an office and successfully logged into the PBGC network from a user s terminal using accounts and passwords obtained during the 1999 internal testing. As the team was leaving the 9 th floor office space, a PBGC employee questioned them about who they were. The employee stated he was going to call building security. At that point, the team revealed that they were performing a physical security review for the OIG. The employee called the OIG contact to validate the team s claim. The OIG contact informed the employee that the team was conducting a test and did have authorization from the OIG to be in the building. The employee did not call building security to have the team escorted from the building. Our testing found that although two PBGC employees challenged unauthorized outsiders and followed escalation procedures, there were many that did not. We also found that the only written guidance concerning monitoring and reporting unauthorized persons in PBGC space is an attachment to a 1994 building security memorandum. As a result, PBGC should develop and publicize guidance regarding employee s responsibility for monitoring and reporting unauthorized persons in PBGC space. This will enhance PBGC s security awareness programs and increase employee knowledge and vigilance of PBGC physical security policies. PBGC has taken steps to secure the Local Area Network (LAN) closets that were accessed during the 1999 penetration test. A metal strip was installed on the LAN closet doors to prevent access by means of compromising the lock, as was easily done in The team also was unsuccessful at gaining unauthorized access to the main PBGC computer room. Social Engineering The social engineering tests consisted of scripted scenarios that tested user awareness of and compliance with PBGC security policies and procedures. The penetration team s efforts included two scenarios: calling the Help Desk and asking to be assigned a new password, and contacting a PBGC employee in an attempt to have them reveal their password. During the call to the Help Desk, the team was informed that in order to have a password reset, a user must go to the Help Desk window in person, and provide a valid ID. The Help Desk would not reset the password over the phone. During the calls to PBGC staff members, the team was unable to persuade PBGC employees to reveal their passwords. ASSESSMENT OF STRENGTHS Comparing our original 1999 testing results to our 2001 penetration re-testing, we noted improvements in PBGC s security measures and control elements over information technology, including the following strengths: 9 The Internet firewall configuration blocks unauthorized and unnecessary traffic to the PBGC internal network. 9 Internet vulnerability scans of the PBGC Web Servers did not identify any significant weaknesses. 9 Attempts to compromise the Internet mail server were not successful. 9 PBGC dial-in access points could not be compromised. 9 The intrusion detection system discovered the team s internal testing attempts. -6-
10 9 Novell servers could not be accessed remotely via the rconsole utility. 9 UNIX systems require SecurID (tokens for remote log-in and super-user status) for authentication and could not be accessed. 9 UNIX systems are using secure shell for remote access. This encrypts the network traffic to prevent sniffing user names and passwords, etc. 9 Help Desk procedures for password resetting help counter social engineering attempts. 9 Account lockout was enabled on all PBGC systems and network devices tested. 9 PBGC routers are not using easily guessed protocols, such as SNMP community strings. ASSESSMENT OF WEAKNESSES 9 PBGC needs to take steps to ensure that every account on the system has strong passwords. User level access was obtained on PBGC s main Windows NT domain and on the PBGC Novell tree using accounts with either no password or with the password set to the account name. This is a repeat of a1999 finding. 9 The team was able to login with administrator-level privileges to the contractor-operated Novell Service Directory using an account without a password. It appeared that PBGC set up some Novell servers and created an NDS for the contractor. This condition poses a risk as an unauthorized individual may use entry to the contractor-operated tree in order to gain entry to the PBGC internal network via these Novell servers. Since this was a contractor for PBGC, there were files, data, containing information about PBGC on its NDS. The penetration team was capable of reading, modifying or deleting this data. This data appeared to be sensitive and PBGC should address this issue. 9 Unauthorized persons are able to gain access to locked PBGC space and walk around unchallenged. While there were indications of some improved employee awareness, there were also indications of the continued need for improvement in this area. This was a 1999 finding. RECOMMENDATIONS Based on the results of our testing, the following actions are recommended: Assign strong passwords to user level accounts with null passwords or passwords set to the account name in the Windows NT and Novell environment. (IRMD-125) Assign strong passwords to administrator level accounts with null passwords on the Contractor operated Novell Directory Service tree. (IRMD-126) Develop and publicize guidance for employees to monitor and report unauthorized personnel in PBGC office areas. (IRMD-127) -7-
11 Tab I
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
How To Audit The Mint'S Information Technology
Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
86-10-15 The Self-Hack Audit Stephen James Payoff
86-10-15 The Self-Hack Audit Stephen James Payoff As organizations continue to link their internal networks to the Internet, system managers and administrators are becoming increasingly aware of the need
Windows Operating Systems. Basic Security
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How
This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How Network Security Is Breached Network Security Policy
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Discovering passwords in the memory
Discovering passwords in the memory Abhishek Kumar ([email protected]) November 2003 Escalation of privileges is a common method of attack where a low privileged user exploits a vulnerability
Information Technology Cyber Security Policy
Information Technology Cyber Security Policy (Insert Name of Organization) SAMPLE TEMPLATE Organizations are encouraged to develop their own policy and procedures from the information enclosed. Please
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
Best Practices For Department Server and Enterprise System Checklist
Best Practices For Department Server and Enterprise System Checklist INSTRUCTIONS Information Best Practices are guidelines used to ensure an adequate level of protection for Information Technology (IT)
Network Security Policy: Best Practices White Paper
Security Policy: Best Practices White Paper Document ID: 13601 Introduction Preparation Create Usage Policy Statements Conduct a Risk Analysis Establish a Security Team Structure Prevention Approving Security
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Understanding Security Testing
Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many
modules 1 & 2. Section: Information Security Effective: December 2005 Standard: Server Security Standard Revised: Policy Ref:
SERVER SECURITY STANDARD Security Standards are mandatory security rules applicable to the defined scope with respect to the subject. Overview Scope Purpose Instructions Improperly configured systems,
VPN Overview. The path for wireless VPN users
VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
The Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
1. Why is the customer having the penetration test performed against their environment?
General Questions 1. Why is the customer having the penetration test performed against their environment? Assess vulnerabilities in order to improve security and protect client information. 2. Is the penetration
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
8 Steps for Network Security Protection
8 Steps for Network Security Protection cognoscape.com 8 Steps for Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because
Rapid Vulnerability Assessment Report
White Paper Rapid Vulnerability Assessment Report Table of Contents Executive Summary... Page 1 Characteristics of the Associated Business Corporation Network... Page 2 Recommendations for Improving Security...
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
8 Steps For Network Security Protection
8 Steps For Network Security Protection 8 Steps For Network Security Protection Many small and medium sized businesses make the mistake of thinking they won t be the target of hackers because of their
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2. Exit Conference...
NEA OIG Report No. R-13-03 Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning to detect vulnerabilities... 2 Area
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Audit Report The Department's Configuration Management of Non-Financial Systems OAS-M-12-02 February 2012 Department
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING
6. AUDIT CHECKLIST FOR NETWORK ADMINISTRATION AND SECURITY AUDITING The following is a general checklist for the audit of Network Administration and Security. Sl.no Checklist Process 1. Is there an Information
Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2
Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures
HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1 Agenda The Proposed Rule
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Incident Response Plan for PCI-DSS Compliance
Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Securing Database Servers. Database security for enterprise information systems and security professionals
Securing Database Servers Database security for enterprise information systems and security professionals Introduction: Database servers are the foundation of virtually every Electronic Business, Financial,
Information Technology Security Procedures
Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, 2009. Concepts.
Protect - Detect - Respond A Security-First Strategy HCCA Compliance Institute April 27, 2009 1 Today s Topics Concepts Case Study Sound Security Strategy 2 1 Security = Culture!! Security is a BUSINESS
Ethical Hacking Agreement for External Network Security Unannounced Penetration Test
Ethical Hacking Agreement for External Network Security Unannounced Penetration Test Agreement made on the (date), between (Name of Consultant) of (street address, city, state, zip code), referred to herein
About Microsoft Windows Server 2003
About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
e-governance Password Management Guidelines Draft 0.1
e-governance Password Management Guidelines Draft 0.1 DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S.
Catapult PCI Compliance
Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Improved Security Required for DHS Networks (Redacted) Notice: The Department of Homeland Security, Office of Inspector General, has redacted
Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2
Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls
Payment Card Industry (PCI) Compliance. Management Guidelines
Page 1 thehelpdeskllc.com 855-336-7435 Payment Card Industry (PCI) Compliance Management Guidelines About PCI Compliance Payment Card Industry (PCI) compliance is a requirement for all businesses that
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach
PBGC Information Security Policy
PBGC Information Security Policy 1. Purpose. The Pension Benefit Guaranty Corporation (PBGC) Information Security Policy (ISP) defines the security and protection of PBGC information resources. 2. Reference.
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
Five Steps to Improve Internal Network Security. Chattanooga ISSA
Five Steps to Improve Internal Network Security Chattanooga ISSA 1 Find Me AverageSecurityGuy.info @averagesecguy [email protected] github.com/averagesecurityguy ChattSec.org 2 Why? The methodical
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report
2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report 28 September 2012 Submitted to: Donald Lafleur IS Audit Manager ND State Auditor
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Department of Information Technology Active Directory Audit Final Report. August 2008. promoting efficient & effective local government
Department of Information Technology Active Directory Audit Final Report August 2008 promoting efficient & effective local government Executive Summary Active Directory (AD) is a directory service by Microsoft
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Information Security Assessment and Testing Services RFQ # 28873 Questions and Answers September 8, 2014
QUESTIONS ANSWERS Q1 How many locations and can all locations be tested from a A1 5 locations and not all tests can be performed from a central location? central location. Q2 Connection type between location
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010
S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M Bomgar Product Penetration Test September 2010 Table of Contents Introduction... 1 Executive Summary... 1 Bomgar Application Environment Overview...
Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
Using a VPN with CentraLine AX Systems
Using a VPN with CentraLine AX Systems User Guide TABLE OF CONTENTS Introduction 2 What Is a VPN? 2 Why Use a VPN? 2 How Can I Set Up a VPN? 2 Important 2 Network Diagrams 2 Network Set-Up with a VPN 2
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
Penetration Testing. University of Sunderland CSEM02 Harry R Erwin, PhD
Penetration Testing University of Sunderland CSEM02 Harry R Erwin, PhD Resources Qinetiq Information Security Foundation Course (2002) Tittle, Stewart, and Chapple, 2004, CISSP: Certified Information Systems
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
Department of Information Technology Remote Access Audit Final Report. January 2010. promoting efficient & effective local government
Department of Information Technology Remote Access Audit Final Report January 2010 promoting efficient & effective local government Background Remote access is a service provided by the county to the Fairfax
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
4. Getting started: Performing an audit
4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
