Penetration Testing and Vulnerability Assessment



Similar documents
Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Guide to Penetration Testing

Risks and Trends in Network Security. Credit Unions

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. June 5, CliftonLarsonAllen LLP

Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh

HIPAA: Compliance Essentials

PCI DSS v3.0 Vulnerability & Penetration Testing

HOW SECURE IS YOUR PAYMENT CARD DATA?

Client Security Risk Assessment Questionnaire

Cybersecurity: Protecting Your Business. March 11, 2015

Network Segmentation

Guided HIPAA Compliance

Think like an MBA not a CISSP

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

How To Protect Your Data From Being Stolen

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Application Backdoor Assessment. Complete securing of your applications

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Trustkeeper PCI Compliance Guide for Merchants

Payment Card Industry (PCI) Penetration Testing Standard

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Current Trends in Cyber Crime & Payments Fraud cliftonlarsonallen.com

How To Protect Yourself From A Hacker Attack

How to Eliminate the No: 1 Cause of Network Downtime. Learn about the challenges with configuration management, solutions, and best practices.

Customer PCI 3.0 Changes = New Opportunity For You. Giles Witherspoon-Boyd SecurityMetrics

PCI-DSS Penetration Testing

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Risk Management and Internal Audit Specialized Training Course Audit Risk Assessment Methodology

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Customer-Facing Information Security Policy

NEW PENETRATION TESTING REQUIREMENTS, EXPLAINED

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Get More Out of Your Risk Assessment. Austin Chapter of the IIA

Using Free Tools To Test Web Application Security

PCI Compliance for Healthcare

Cloud Security and Managing Use Risks

Learning objectives for today s session

locuz.com Professional Services Security Audit Services

SECURITY. Risk & Compliance Services

Enterprise Risk Management Process Improvement. Secure Banking Solutions, LLC

Auditing in the New Millennium:

PCI Requirements Coverage Summary Table

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP

Compliance and Industry Regulations

NIST National Institute of Standards and Technology

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

PCI DSS. Payment Card Industry Data Security Standard.

Review: McAfee Vulnerability Manager

Professional Services Overview

PCI DSS and SSC what are these?

White Paper. Common PCI Audit Mistakes. Seth Peter CTO, NetSPI. November Contents Why Mistakes Occur 2

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Information Security Services

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Presented By: Bryan Miller CCIE, CISSP

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Third-Party Access and Management Policy

Security Controls What Works. Southside Virginia Community College: Security Awareness

Penetration testing & Ethical Hacking. Security Week 2014

University of Windsor Board of Governors. That the Board of Governors approve of the Enterprise Risk Management Framework.

From the Bottom to the Top: The Evolution of Application Monitoring

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

A Decision Maker s Guide to Securing an IT Infrastructure

Transcription:

2013 CliftonLarsonAllen LLP Penetration Testing and Vulnerability Assessment CLAconnect.com

Presentation overview What is Risk Assessment Governance Frameworks Types of Audits Vulnerability Assessment Penetration Testing

CliftonLarsonAllen Started in 1953 with a goal of total client service Today, industry specialized CPA and Advisory firm ranked in the top 10 in the U.S.

Our perspective CliftonLarsonAllen Started in 1953 with a goal of total client service Today, industry specialized CPA and Advisory firm ranked in the top 10 in the U.S. Information Security offered as specialized service offering for over 15 years Largest Credit Union Service Practice* *Callahan and Associates 2014 Guide to Credit Union CPA Auditors. CliftonLarsonAllen s credit union practice has recently grown to over 100 professionals including more than 20 principals. The group focuses on audit, assurance, consulting and advisory, information technology, and human resource management for credit unions across the country. www.larsonallen.com news release

We need Our board said we need to do an IT Audit To be in compliance with XYZ, we need to do a Risk Assessment

Governance Frameworks Standards for Penetration Testing NIST 800-53 http://csrc.nist.gov/publications/nistpubs/800-53arev1/sp800-53a-rev1-final.pdf OWASP http://www.owasp.org OSSTMM http://www.osstmm

Governance Frameworks Common Frameworks - Matrix Resources: http://net.educause.edu/ir/library/pdf/csd5876.pdf

Types of Risk Assessments and Audits Risk Assessment Enterprise Risk Assessment IT Risk Assessment Compliance Risk Assessment IT Audits Process Audits (ie. ACH) IT Compliance Audits Security Assessment Vulnerability Assessments Penetration Testing Social Engineering

Audit Philosophy and Approach Philosophy: People, Rules and Tools Approach: Understand Test Assess People Rules ` Tools

Risk Assessment Theory Inherent Risk Likelihood vs Impact Control Risk Total Risk IR X CR = TR

Risk Assessment ID Assets Define Threats and Vulnerabilities Classify the likelihood of bad things Quantify the impact Stop here: Residual Risk Continue: Test Effectiveness of Controls (audits)

Traditional IT Audit Broad audits IT General Controls Review Specific/focused audits DRP/IR/BCP audits and testing SDLC and Change Management audits User and group permission audits Vendor management

Traditional IT Audit IT General Controls Review A mile wide and 10 feet deep

Traditional IT Audit PCI DSS 1 2 3 4 5 6

Traditional IT Audit IT General Controls Review Good for broad, high level coverage of IT management, information security program, and compliance requirements Answers the question: Do we have the right standards and are they well documented? Effectiveness testing tends to be light Does not really test the systems or ID exceptions

Traditional IT Audit Focused Audits Common Examples include DRP/IR/BCP audit and testing; user access reviews; SDLC and Change Management; ACH or other application audits More focused audits get to the next level of detail; focus on the process and perhaps application level controls (ie. menus); effectiveness testing tends to be more thorough, but likely still based on sampling These can be Design or Compliance focused

Vulnerability Assessment Port Scans and Vulnerability Scans They are like Radar Pros Cons External and Internal Scanning What are the benefits? Example Monthly scanning for local municipality July nothing new/unusual August nothing new/unusual September - SSH open, and

Penetration Testing External Network Applications Internal Network Wireless Facilities (social engineering)

Penetration Testing Goals and Objectives: Understand, Test, and Assess Validate things behave as expected Find/Identify new things

External Network Penetration Testing Everything that touches the outside 1. Routing devices 2. Remote access 3. Web/applications* 4. Other*:

External Network Penetration Testing Pros Cons

Application Penetration Testing External Network Everything that touches the outside

Application Penetration Testing Pros Cons

Internal Network Penetration Testing Internal Network Everything inside with an IP address.

Internal Network Penetration Testing Pros Cons

Wireless Network Penetration Testing Wireless Network What do we know we have. What do we have that we don t know. Anything else.

Wireless Network Penetration Testing Pros Cons

Social Engineering Tests Pros People Rules Cons Tools `

Definition of a Secure System A secure system is one we can depend on to behave as we expect. Source: Web Security and Commerce by Simson Garfinkel with Gene Spafford Confidentiality Integrity Availability People Rules ` Tools 29

Questions? 2013 CliftonLarsonAllen LLP

2013 CliftonLarsonAllen LLP Thank you! CLAconnect.com Randy Romes, CISSP, CRISC, MCP, PCI-QSA Principal Information Security Randy.romes@CLAconnect.com 888.529.264

Sources for Standards and Guidelines NIST 800-53: Information Security and IT Auditing http://csrc.nist.gov/publications/pubssps.html PCI Requirements https://www.pcisecuritystandards.org/documents/pfi_program_guide.pdf https://www.pcisecuritystandards.org/merchants/self_assessment_form.php HIPAA Security Rule The HIPAA Security Rule Requirements for periodic technical validation testing: Evaluation ( 164.308(a)(8)) Information from Health and Human Services and here