Overview TECHIS60441. Carry out security testing activities



Similar documents
ESKISP Conduct security testing, under supervision

ESKISP Manage security testing

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Overview TECHIS Carry out risk assessment and management activities

ESKISP Direct security testing

Overview TECHIS Manage information security business resilience activities

ESKITP Assist in the preparation of change management plans and assignments for IT enabled systems 1

ESKITP Authorise strategy, policies and standards relating to IT service delivery performance metrics management

SFJCCAD2 Promote business continuity management

ESKITP Implement procedures and standards relating to metrics for IT service delivery

CFAMLE6 Ensure health and safety requirements are met in your area of responsibility

SFJ EFSM14 Manage the performance of teams and individuals to achieve objectives

GLASGOW SCHOOL OF ART OCCUPATIONAL HEALTH AND SAFETY POLICY. 1. Occupational Health and Safety Policy Statement 1

ESKITP7072 IT/Technology Capacity Management Level 2 Role

Application Guidance CCP Penetration Tester Role, Practitioner Level

SFJPE1.3 Evaluate the effectiveness of the operational delivery business process

Committees Date: Subject: Public Report of: For Information Summary

Developing Health and Independence. Pt 22-27, 19,621-22,958 (depending on experience)

The purpose of this Unit is to develop an awareness of the knowledge and skills used by ethical and malicious hackers.

FSPCOMP3 Assess and mitigate the compliance risks relevant to your organisation

National Cybersecurity Assessment and Technical Services: Capability Brief. Presented by: Sean McAfee Updated: May 5, 2014

Risk Management Policy

ESKITP5022 Software Development Level 2 Role

ESKITP5023 Software Development Level 3 Role

INFORMATION SECURITY TESTING

ESKITP7102 IT/Technology Asset and Configuration Management Level 2 Role

SFHGEN98 Promote effective communication in a healthcare environment

FSPAMFPI06 Complete reports for mortgage and/or financial planning clients

Rulebook on Information Security Incident Management General Provisions Article 1

Policy. VBA Enterprise Risk Management. Governance Unit

National Cybersecurity Assessment and Technical Services

developing your potential Cyber Security Training

National Occupational Standards. Compliance

Business Continuity Policy. Version 1.0

JOB DESCRIPTION CONTRACTUAL POSITION

IAM Level 2. NVQ Certificate in Business and Administration. Qualification handbook edition

South Australia Police POSITION INFORMATION DOCUMENT

Cyber Security Evolved

ABERDEEN CITY COUNCIL JOB DESCRIPTION

BUSINESS CONTINUITY MANAGEMENT POLICY

BSO Board Director of Human Resources & Corporate Services Business Continuity Policy. 28 February 2012

ESKITP5022v2 Perform software development activities under direction

Road map for ISO implementation

Job Grade: Band 5. Job Reference Number:

Information Security: Business Assurance Guidelines

Technology and Cyber Resilience Benchmarking Report December 2013

Risk management systems of responsible entities

Security Testing for Web Applications and Network Resources. (Banking).

Spillemyndigheden s change management programme. Version of 1 July 2012

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

SFJFRSFF2 SQA Unit Code (FA6J 04) Take responsibility for effective performance in fire and rescue

ISO Information Security Management Services (Lot 4)

Legislative Council Panel on Information Technology and Broadcasting. Information Security

IoT & SCADA Cyber Security Services

ICAICT704A Direct ICT in a supply chain

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

A Changing Commission: How it affects you - Issue 1

DERBYSHIRE COUNTY COUNCIL BUSINESS CONTINUITY POLICY

Please see the full job description at the end of this document for full details on the Qualifications and Experience required for this role.

JOB DESCRIPTION. Emergency Ambulance Control (EAC) Quality Assurance Auditor. Assistant Director of Control and Communications

Achieve. Performance objectives

London Borough of Havering Job Profile. Directorate: Post Number(s): Grade: SC5 Date last updated: September 2014

Risk Management & Business Continuity Manual

Cyber Essentials Scheme

External Supplier Control Requirements

Third party assurance services

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

Our Commitment to Information Security

Transcription:

Overview Information, services and systems can be attacked in various ways. Understanding the technical and social perspectives, how attacks work, the technologies and approaches used are key to being able to protect against attacks This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to information security threats and vulnerabilities. Assisting applying testing methods, including penetration testing, assessing the robustness of an information system, against a coordinated attack. TECHIS60441 1

Performance criteria You must be able to: 1. be responsible for penetration testing in own area of work 2. develop and maintain security testing standards and procedures in line with organisational standards 3. tailor the scope of testing to meet business requirements 4. undertake information security tests, under controlled conditions, to assess vulnerabilities and compliance against relevant internal and/or external standards 5. use a range of appropriate methods, tools and techniques to conduct penetration testing for the systematic identification of vulnerabilities across multiple information systems 6. select and specify the most appropriate tools to be used during penetration testing 7. design and implement tests plans for networks and information systems in line with organisationalstandards 8. develop through life test programmes to assess whether security is maintained 9. lead and manage a penetration testing team, prioritising resource allocation and capability management ensuring that appropriate ongoing training and development is in place 10. scan information systems and networks for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits. Reports potential issues and mitigation options 11. scan web applications and services for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits. Reports potential issues and mitigation options 12. scan Wi-Fi networks for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits 13. scan control systems and networks for public domain vulnerabilities and assesses the potential for exploitation, where appropriate by conducting exploits. Reports potential issues and mitigation options 14. report potential issues and mitigation options for security scanning operations 15. plan and execute social engineering attack exercises within an organisation or part thereof to assess the security awareness and culture 16. clearly and accurately scope and plan the information security test approach, prioritising testing activity to proactively target the most significant threats and vulnerabilities first 17. interpret information assurance requirements to produce information security test acceptance criteria TECHIS60441 2

18. 19. 20. 21. 22. 23. 24. carefully plan a context driven test approach to systematically test a system in order to validate its information security status design and develop accurate and clear test scripts, plans and acceptance criteria to ensure that information assurance requirements can be tested against relevant internal and/or external standards critically review the results of penetration testing and accurately identify specific vulnerabilities within any specified information system prioritise outcomes and recommend specific and timely action to address vulnerabilities identified as a result of information security testing clearly report on and communicate the results of information security testing, recommending mitigation actions ensure information security testing reports are high quality and relevant to the audience communicate the results of information security testing to a range of audiences justifying and evidencing any recommendations on security failures and non compliance TECHIS60441 3

Knowledge and understanding You need to know and understand: 1. 2. 3. 4. 5. 6. 7. 8. the specific threats that may be of particular importance to any particular information system how to organise a information security testing approach following standard procedures how to use the range of tools and techniques that can be applied for penetration testing relevant UK legislation and its impact on penetration testing (including computer misuse act 1990; human rights act 1998 data protection act 1998 police and justice act 2006 the latest information and data on a wide range of information security vulnerabilities the importance of ensuring that information security testing is designed to ensure testing of all aspects of information systems across the core principles: ( including confidentiality integrity availability authorisation authentication non repudiation ) the potential impact of the vulnerabilities identified on any information system and on the organisation where to find the latest information on vulnerabilities or exploits and can design tests to identify them TECHIS60441 4

Developed by e-skills Version Number 1 Date Approved January 2016 Indicative Review Date Validity Status Originating Organisation Original URN Relevant Occupations Suite Keywords April 2019 Current Original The Tech Partnership TECHIS60441 Information and Communication Technology; Information and Communication Technology Officer; Information and Communication Technology Professionals Information Security Information security, cyber security, penetration testing TECHIS60441 5