Scoping Questionnaire for Penetration Testing



Similar documents
SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

IBM Global Technology Services Statement of Work. for. IBM Infrastructure Security Services - Penetration Testing - Express Penetration Testing

Information Security Services

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

ensuring security the way how we do it

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Web application security: automated scanning versus manual penetration testing.

Guide to Penetration Testing

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Hackers are here. Where are you?

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Hands-On Ethical Hacking and Network Defense - Second Edition Chapter 1. After reading this chapter and completing the exercises, you will be able to:

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

External Supplier Control Requirements

Hackers are here. Where are you?

About Effective Penetration Testing Methodology

Penetration Testing. A Structured Approach. DEFCONPH Manila Beer Talk II. April 24, 2009

Penetration Testing. Presented by

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Securing your Corporate Infrastructure What is really needed to keep your assets protected

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Certified Cyber Security Analyst VS-1160

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

Certified Cyber Security Analyst VS-1160

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Penetration testing & Ethical Hacking. Security Week 2014

G-Cloud Definition of Services Security Penetration Testing

Cyber Security Management

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

HTExploit: Bypassing htaccess Restrictions

93% of large organisations and 76% of small businesses

Presented by Evan Sylvester, CISSP

Malta Resources Authority Millennia, Aldo Moro Road, Marsa MRS 9065 Malta Telephone: (356) Fax: (356) Call for Quotations

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298

Learn Ethical Hacking, Become a Pentester

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Introduction to Penetration Testing Graham Weston

EC-Council Certified Security Analyst (ECSA)

McAfee Certified Assessment Specialist Network

Access FedVTE online at: fedvte.usalearning.gov

Network Security Audit. Vulnerability Assessment (VA)

We ve been hacked! We did it! Rick Grandy Lockheed Martin Hanford Site

Expert Services Group (Security Testing) Nilesh Dasharathi Sadaf Kazi Aztecsoft Limited

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Paul Vlissidis Group Technical Director NCC Group plc

Patch and Vulnerability Management Program

Ethical Hacking and Penetration Testing Presented by: Adam Baneth Managing director

Global Web Application Firewall Market

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Module 1: Introduction to Designing Security

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

Cyber R &D Research Roundtable

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

PCI Compliance 3.1. About Us

IDS and Penetration Testing Lab ISA 674

VULNERABILITY MANAGEMENT AND RESEARCH PENETRATION TESTING OVERVIEW

LINUX / INFORMATION SECURITY

Ethical Hacking Agreement for External Network Security Unannounced Penetration Test

PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

Procuring Penetration Testing Services

Penetration Testing Services. Demonstrate Real-World Risk

Secure Web Applications. The front line defense

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

ESKISP Manage security testing

MSc Cyber Security. identity. hacker. virus. network. information

Passing PCI Compliance How to Address the Application Security Mandates

A Systems Engineering Approach to Developing Cyber Security Professionals

Course Title: Course Description: Course Key Objective: Fee & Duration:

The Cyber Threat Profiler

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Digi Device Cloud: Security You Can Trust

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

Transcription:

Scoping Questionnaire for Penetration Testing BII Compliance and its contractors adhere to the OSSTMM penetration testing methodology and code of ethics. The analysts performing these tests will each be certified security practitioners holding at least one certification of Certified Information Systems Security Professional (CISSP). All practitioners profiles will be sent to the project manager at the site to be tested along with this scoping questionnaire. Penetration tests can range in a number of varieties from testing one application based on known vulnerabilities to far-reaching tests where no vulnerability information is provided and every system and network is in-scope. Additionally, a penetration can go as far as to gain control of the system by any means (aggressive) or to simply illustrate that it could be done by taking these next steps, without actually taking the steps. The following questions are intended to determine and refine the scope and extent of a desired penetration test. This template should be reviewed by our client and answered as thoroughly as possible. In the event that the client is not able to answer these questions, it is recommended that a BII Compliance security practitioner review each question with the client to ensure adequate information is obtained. Preferably the practitioner that will be testing the client site. British laws require that BII Compliance obtain written permission by an authorised representative of the client to perform a penetration/security assessment. Please reference Appendix A entitled, Security Testing and Penetration Testing Authorisation Agreement. # QUESTIONS ANSWER COMMENTS 1) What is the business requirement for this penetration test? 1. This is required by a regulatory audit or standard? 2. Proactive internal decision to determine all weaknesses? For example, is the driver for this to comply with an audit requirement, or are you seeking to proactively evaluate the security in your environment?

2) Will this be a white box test or a black box test? White Box can be best described as a test where specific information has been provided in order to focus the effort. Black Box can be best described as a test where no information is provided by the client and the approach is left entirely to the penetration tester (analyst) to determine a means for exploitation. 3) How many IP addresses and/or applications are included as in-scope for this testing? Please list them, including multiple sites, etc. 4) What are the objectives? a.) Map out vulnerabilities b.) Demonstrate that the vulnerabilities exist c.) Test the Incidence Response d.) Actual exploitation of a vulnerability in a network, system, or application. Obtain privileged access, exploit buffer overflows, SQL injection attacks, etc. This level of test would carry out the exploitation of a weakness and can impact system availability. e.) All of the above 5) What is the target of the Penetration test? Is it; a.) An Application b.) A Website c.) A Network d.) Application and Network e.) Wireless f.) Other, please explain 6) Do you also want the following tests to be performed? a.) Physical security test to gain access to physical space by evading physical security controls b.) Social Engineering test to gain sensitive information from one or more of your employees (to infer or solicit sensitive information)

# QUESTIONS ANSWER COMMENTS 7) What protocol should be followed for alerting on vulnerabilities found? a.) Wait until the end of the testing to report all vulnerabilities b.) Report vulnerabilities as we find them c.) Daily report on the status of the testing d.) Report only critical findings immediately 8) Will this testing be done on a production environment? You need to understand that certain exploitation of vulnerabilities to determine and/or prove a weakness could crash your system or cause it to reboot. BII Compliance is not liable for downtime caused by proving the system s weakness to attack. 9) If production environments must not be affected, does a similar environment (development and/or test systems) exist that can be used to conduct the pen test? 10) Are the business owners aware of this pen test? Are key stakeholders (business owners) aware that the nature of a pen test is to attack the system as a hacker (or hostile actor) would in order to learn and prove the system s weakness?

# QUESTIONS ANSWER COMMENTS 11) At what time do you want these tests to be performed? a.) During business hours b.) After business hours c.) Weekend hours d.) During system maintenance window 12) Who is the technical point of contact, assuming this is not a covert (black box) test of the incident response function? Name: Cellular phone number (available during this project) Alternate Name: Cellular phone number (available during this project) 13) Additional Information?

APPENDIX A SECURITY TESTING AND PENETRATION TESTING AUTHORISATION AGREEMENT Security Testing and Penetration Testing Authorisation Agreement To authorise technical security assessment or penetration testing, please complete this form and fax to: BII Compliance Ltd Cyber Security Partner (CSP) Barham Court, Maidstone Kent, England. ME18 5BZ United kingdom Fax: 0044 1622 618601 Contact and Scope Definitions Client/Company Name: (please print) Technical Contact Name: Technical Contact Telephone: Technical Contact E-mail:

IP Addresses / Ranges to be tested: (please identify internal or external addresses) Domain Name(s): Requested Date and Time of Assessment(s):

Please initial each of the boxes indicating your acceptance of the following statements: [ ] I am authorised to authorise BII Compliance Ltd to test the IP address(s) listed herein and hereby permit BII Compliance representatives to perform penetration testing of said IP address(s). [ ] I have been informed and understand that testing of this nature may or may not impact the uptime of the network and/or the hardware being tested. I have been informed of options for scheduling testing to be run at hours convenient to my business, allowing me to limit the impact of events that could occur. Client Authorising Name and Signature (required) Authorised Name: (please print) Authorized Signature: Date: