Penetration Testing. A Structured Approach. DEFCONPH Manila Beer Talk II. April 24, 2009



Similar documents
SCOPING QUESTIONNAIRE FOR PENETRATION TESTING

Procuring Penetration Testing Services

Scoping Questionnaire for Penetration Testing

Information Security Organizations trends are becoming increasingly reliant upon information technology in

Application Security in the Software Development Lifecycle

UNITED STATES DEPARTMENT OF EDUCATION OFFICE OF INSPECTOR GENERAL. September 24, 2010

Commercial Practices in IA Testing Panel

5 Simple Steps to Secure Database Development

Guide to Penetration Testing

GUIDELINES FOR THE ENGAGEMENT OF EXTERNAL CONSULTANTS/PROFESSIONAL SERVICES AT MEMORIAL UNIVERSITY

Ayla Networks, Inc. SOC 3 SysTrust 2015

Information Security Services

IBM Rational AppScan: enhancing Web application security and regulatory compliance.

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Security and Cloud Computing

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Request for Proposals on Security Audit Services

Penetration testing & Ethical Hacking. Security Week 2014

Infrastructure Information Security Assurance (ISA) Process

Information security risk management using ISO/IEC 27005:2008

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Frequently Asked Questions (FAQ) Guidelines for quality compliance of. eprocurement System?

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Outsourcing and Information Security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

NETWORK PENETRATION TESTING

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Network Security Audit. Vulnerability Assessment (VA)

Cisco Security Optimization Service

Information Security Management Systems

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

(Instructor-led; 3 Days)

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

UF IT Risk Assessment Standard

The case for continuous penetration testing

Web application security: automated scanning versus manual penetration testing.

Third Party Security Requirements Policy

Effective Software Security Management

CPNI VIEWPOINT 01/2010 CLOUD COMPUTING

HIPAA: Compliance Essentials

TELEFÓNICA UK LTD. Introduction to Security Policy

G-Cloud III Services Service Definition Accenture Cloud Security Services

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

Web Maniac Hacking Trust. Aditya K Sood [adi_ks [at] secniche.org] SecNiche Security

2011 Forrester Research, Inc. Reproduction Prohibited

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

I N T R O D U C T I O N THE PROCESS OF ACQUIRING GOODS WORKS AND SERVICES BY GOVERNMENT PROCURING ENTITIES.

UF Risk IT Assessment Guidelines

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

G-Cloud IV Services Service Definition Accenture Cloud Security Services

Digital Continuity in ICT Services Procurement and Contract Management

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

5.5. Penetration Tests. Report of the Auditor General of the Ville de Montréal to the City Council and to the Urban Agglomeration Council

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

External Supplier Control Requirements

NIST National Institute of Standards and Technology

Managing IT Security with Penetration Testing

Penetration Testing - a way for improving our cyber security

Request for Proposal HIPAA Security Risk and Vulnerability Assessment

Cyber Security Management

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 14 Risk Mitigation

How To Get Construction Procurement Services

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER

Fujitsu s Approach to Cloud-related Information Security

The State of Mobile Application Insecurity

Data Security Incident Response Plan. [Insert Organization Name]

Defending Against Data Beaches: Internal Controls for Cybersecurity

Response to Queries Received for RFP of Security Integrator - Tender No. 63

Cloud Security Who do you trust?

The Influence of Software Vulnerabilities on Business Risks 1

IBM Security in the Cloud

Collateral Effects of Cyberwar

Understanding changes to the Trust Services Principles for SOC 2 reporting

Penetration testing. A step beyond missing patches and weak passwords

New Zealand Company Six full time technical staff Offices in Auckland and Wellington

SRI LANKA AUDITING PRACTICE STATEMENT 1013 ELECTRONIC COMMERCE EFFECT ON THE AUDIT OF FINANCIAL STATEMENTS

Information Technology

Guidelines 1 on Information Technology Security

Build (develop) and document Acceptance Transition to production (installation) Operations and maintenance support (postinstallation)

GENERATING VALUE WITH CONTINUOUS SECURITY TESTING

Transcription:

Penetration Testing A Structured Approach DEFCONPH Manila Beer Talk II April 24, 2009 1

Discussion Agenda Introduction and Overview of Penetration Testing (PT) PT - Feasibility, Quality, Value and Limitations Business Models and the Bidding Process Project Management PT Methodologies and Tools Risk Management Communicating the Results Constraints, Challenges and Legal Issues 2

Introduction The objective of this presentation is to provide a meaningful perspective regarding penetration testing as a service. This presentation is focused on the elements beyond the technical process of conducting penetration testing. 3

Overview of Penetration Testing (PT) What is Penetration Testing? A method of evaluating the security of a computer system or network by simulating an attack from a malicious source. - Wikipedia 4

Who are the Players? Global Leaders Philippines Deloitte IBM PWC KPMG E&Y PWC Accenture E&Y Bitshield Security Consulting Laggui & Associates SeQure Technologies Verizon Business Source: The Forrester Wave : Information Security And IT Risk Consulting, Q1 2009, Note that KPMG did not participate in this survey 5

PT Business Feasibility Feasibility Regulatory Requirements Hiring Issues Software Licenses Competition PT Services Market Outsourcing Customer Commitment 6

PT Quality of Service Differences in the Quality of PT as a service depends on: The extent to which the penetration test caters to the client s technical and business environment or situation How much time and resources are spent on detecting vulnerabilities related to IT components included in the Scope How creative the penetration tester s approach and methodology is 7

PT Value of Service What value does your service bring to my business? Identify my control weaknesses? Peace of Mind? Improve my Security Posture? Compliance with Regulatory Requirements? THE HELPLESS CLIENT 8

PT Limitations A Penetration Test only reflects the situation at a particular point in time and cannot provide assertions about the company's security posture that are valid in the future. A thorough Penetration Testing does not guarantee that a successful attack will not occur, but it may reduce the probability of a successful attack. 9

PT Limitations, Cont. A Penetration Test is not a substitute for a general security policy or other IT securityrelated testing 10

Business Models INFORMATION SECURITY SERVICES TECHNICAL NON-TECHNICAL Penetration Testing ISMS Consulting Services Vulnerability Assessment Enterprise Risk Assessment Security Architecture Policy and Standards Dev. Others Others BILLING AND COST CONSIDERATIONS Fixed Fees Per Hour (Actual Hours) Single Billing Progressive Billing 11

The Bidding Process Solicitation Evaluation Awarding Initial discussions, invitation to bid, submission of proposal Selection process based on evaluation criteria Contract is awarded to selected service provider 12

The Bidding Process, Cont. First Things First: Understand the Business of your Client Proposal Preparation: Initial discussion about the Scope, Fees and other relevant matters Study and understand the Request for Proposal (RFP) and its Terms of Reference (TOR) Strictly follow the RFP specifications 13

The Bidding Process, Cont. Sample bidding eligibility requirements: Latest audited financial statements Predefined qualification requirements for both the service provider and the professionals involved Client references and previous engagements 14

Professional Qualifications Demonstrated Professional Integrity Required number of years information security experience of the service provider and its professionals Education and certification requirements of professionals 15

Project Management Security Project Management - Approach PLANNING EXECUTION REPORTING RISK MANAGEMENT AND QUALITY ASSURANCE 16

Project Management, Cont. Security Project Management - Organization Project Sponsor Project Ownership Project Manager Overall Project Management Project Team Project Execution and Documentation 17

Service Provider Responsibilities Abiding to contractual obligations: Maintain confidentiality of information Comply with relevant regulations, professional standards and ethics Address authorization issues and know your boundaries Document penetration test procedures and its results Perform penetration test with Due Professional Care 18

PT Methodologies 19

PT Tools Why do we use tools? Efficiency More output in less time and at lower cost Completeness and Accuracy Tools are just tools, nothing can replace a penetration tester's Competence and Professional Judgment. 20

Risk Management Murphy's law Anything that can go wrong will go wrong The client should recognize the Risk that PT activities may bring down their system even within a controlled environment. Manage the Risk: Strictly follow authorization protocols and implement precautionary measures - Practice Due Professional Care 21

Communicating the Results The result of a penetration test should be more than just a list of existing vulnerabilities and should suggest solutions for their elimination. Presentation and submission of final report to Management I don't understand what you're saying, can you please communicate in plain English?? What is the risk to my business?? THE HELPLESS CLIENT 22

Constraints and Challenges Client Management Building Trust and Rapport Lack of necessary information to reasonably provide the service Scope Creep and Limitations 23

Constraints and Challenges, Cont. Third Party Involvement Extranet PT Accidental Business Interruption: Exploit code execution possible server crashes (External and Internal) MITM attacks possible network downtime (Internal) 24

Legal Issues What are the legal regulations and principles that the penetration tester should observe when conducting penetration tests and which should be clarified with the client prior to testing? 25

Questions? 26

Thank you 27