North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing



Similar documents
External Supplier Control Requirements

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Passing PCI Compliance How to Address the Application Security Mandates

Security Testing and Vulnerability Management Process. e-governance

Reducing Application Vulnerabilities by Security Engineering

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Secure Code Development

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Information Security Services

External Supplier Control Requirements

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Network Security Audit. Vulnerability Assessment (VA)

Web App Security Audit Services

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Attack Vector Detail Report Atlassian

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Adobe Systems Incorporated

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Application Security: What Does it Take to Build and Test a Trusted App? John Dickson, CISSP Denim Group

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

SAST, DAST and Vulnerability Assessments, = 4

Critical Controls for Cyber Security.

WHITEPAPER. Nessus Exploit Integration

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Cyber Essentials. Test Specification

Cybersecurity and internal audit. August 15, 2014

Thick Client Application Security

Information Blue Valley Schools FEBRUARY 2015

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Attachment A. Identification of Risks/Cybersecurity Governance

Columbia University Web Security Standards and Practices. Objective and Scope

NERC CIP VERSION 5 COMPLIANCE

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

Vulnerability Management

8070.S000 Application Security

Metasploit The Elixir of Network Security

PCI COMPLIANCE Protecting Against External Threats Protecting Against the Insider Threat

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

MANAGED SECURITY TESTING

Integrated Threat & Security Management.

Cyber R &D Research Roundtable

Critical Security Controls

G-Cloud Definition of Services Security Penetration Testing

How to Build a Trusted Application. John Dickson, CISSP

Web Application Report

Penetration Testing. Presented by

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Network Segmentation

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

THE TOP 4 CONTROLS.

Magento Security and Vulnerabilities. Roman Stepanov

SANS Top 20 Critical Controls for Effective Cyber Defense

IT Security Testing Services

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

ensuring security the way how we do it

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Introduction to Cyber Security / Information Security

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

S E C U R I T Y A S S E S S M E N T : B o m g a r B o x T M. Bomgar. Product Penetration Test. September 2010

05.0 Application Development

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Office of Inspector General

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Enterprise Computing Solutions

How To Manage Security On A Networked Computer System

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

A Decision Maker s Guide to Securing an IT Infrastructure

Presented by Evan Sylvester, CISSP

Innovative Defense Strategies for Securing SCADA & Control Systems

Stephen Coty Director, Threat Research

Effective Software Security Management

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Privacy + Security + Integrity

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Penetration Testing //Vulnerability Assessment //Remedy

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Overcoming PCI Compliance Challenges

Information and Communication Technology. Patch Management Policy

Transcription:

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division ManTech Mission, Cyber, and Intelligence Solutions Group mark.shaw@mantech.com (703)388-2126 2

Assessment Overview Assessment conducted November 2013-January 2014 5 Major Project Tasks External Vulnerability Assessment Internal Vulnerability Assessment Application Vulnerability Assessment Security Assessment of Non-consolidated IT Services Penetration Testing 3

Vulnerability Assessment Overview A Network Vulnerability Assessment targets an organization s IT infrastructure (network, servers, workstations, etc) with the goal of identifying security weaknesses that could be exploited External assessments are conducted from the Internet and mirror the threat of a malicious outsider (ie- hacker) Internal assessments are conducted on an internal corporate network and mirror the threat of a malicious insider 4

Vulnerability Assessment Overview Assessment methodology Commercial vulnerability scanning software used initially to identify all systems connected to the network and the services they are providing (ie- web server, email server, file server, workstation, etc) Scanning software then runs a series of automated checks to identify vulnerabilities in the installed software and system configurations/settings Test team then validates the results of the automated scans and conducts manual reviews of the identified systems 5

Vulnerability Assessment Overview Assessment methodology (continued) Once the Test team has completed review, the consolidated findings are be presented in a written technical report which identifies the vulnerabilities found during the assessment along with specific remediation recommendations for how to correct the findings and properly secure the system. 6

Vulnerability Assessment Scope External Assessment Test Team focused efforts on approximately 40 publically accessible network segments hosting both ITD and State Agency systems Internal Assessment Test Team scanned 30 internal network segments hosting both ITD and State Agency systems 7

Vulnerability Assessment Results All vulnerability findings were rated as high, medium or low risk High Risk: A malicious user that exploits this level of vulnerability could achieve full control of the system and all data contained on the system Medium Risk: A malicious user that exploits this level of vulnerability could achieve limited user level control of the system and/or compromise data contained on the system Low Risk: A malicious user that exploits this level of vulnerability could achieve limited access to data contained on the system 8

Vulnerability Assessment Results 38 total Vulnerability findings All findings could be classified into two major areas: Systems missing critical software patches, and Systems with configuration vulnerabilities Missing Software Patches (OS or Application) 23 High risk, 6 Medium Risk Configuration Vulnerabilities 4 High risk, 4 Medium risk, 1 Low risk 9

Application Vulnerability Assessment Overview Two-tiered approach to application security testing Automated scanning Manual assessment Focus on common application vulnerability issues Un-validated input Non-functioning access controls Authentication and session management issues Cross-site scripting flaws Buffer overflows Injection flaws Improper error handling Insecure data storage Denial of service (DoS) 10

Application Vulnerability Assessment Scope ManTech assessed two applications State NDGOV Portal CJIS Application Allow ITD to benchmark the state s Application Assessment process against Test Team findings 11

Application Vulnerability Assessment Results 3 total vulnerability findings NDGOV Portal 2 Medium risk CJIS 1 Medium risk 12

Security Assessment of Non-consolidated IT Services Overview and Scope Test Team evaluated the physical and logical security of electronic mail, database administration, and application server services that were not consolidated within ITD Limited vulnerability scanning and application scanning were conducted if requested by the agency Items evaluated included: Physical Security Network Configuration and Architecture Network Access Controls Auditing Malware Protection/Antivirus Recovery and Back-Up Procedures Vulnerability Scanning Security Patch Updates 13

Security Assessment of Non-consolidated IT Services Scope Agencies assessed during this phase include Office of the Attorney General Department of Mineral Resources Oil and Gas Division Public Service Commission Water Commission Housing and Finance Agency Department of Emergency Services. 14

Security Assessment of Non-consolidated IT Services Results Results of the physical and network security assessments varied greatly by agency depending on the mission of the agency assessed Agencies lacked formal processes and in some cases tools to conduct periodic network vulnerability assessments of their infrastructure. 15

Penetration Testing Overview Purpose is to emulate realistic & current threats in an attempt to gain access to systems and/or information via both technical and non-technical means Testing attempts to exploit discovered vulnerabilities and test an organization s response procedures Two Primary Test methods Direct System Exploitation Social Engineering (not executed during this assessment) 16

Penetration Testing Results Direct Exploitation Test Team explored 10 potential scenarios based on assessment results All scenarios assumed access to the internal state network Of the scenarios, 4 led to direct system access 17

18 Penetration Testing Example- IP Camera

19 Penetration Testing Example- DRAC Authentication Bypass

General Security Recommendations Continue Maturation of Patch Management Program Baselines need to be established for all operating system and application software used on the network and regular patching processes set up to ensure all systems receive critical patches in a timely fashion Focus on 3 rd party applications; consider application whitelisting Adherence to patch management timelines with compliance monitoring Continuous Monitoring approach for real-time visibility Internal Network Segmentation Critical servers and development systems should be segregated from the internal network to minimize exposure of critical data Require use of Encrypted protocols for Remote Management Only encrypted protocols should be used to remotely manage systems 20

General Security Recommendations (cont) Restrict Access to Protocols for Remote Management from the Internet IP-based access controls should be implemented to restrict access to trusted systems. Develop Formal Vulnerability Scanning Program- Nonconsolidated IT Services Institute periodic review and assessment process for nonconsolidated IT services to proactively measure compliance with vulnerability patching requirements. 21

Conclusion Results of this assessment are typical for organizations of a similar size and maturity Number one recommendation that can be implemented to improve security of the network is to continue to mature patch management program and ensure nonconsolidated IT services are included. 22

Questions