Checklist for Vulnerability Assessment

Similar documents
PCI DSS v3.0 Vulnerability & Penetration Testing

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Payment Card Industry (PCI) Penetration Testing Standard

Continuous compliance through good governance

Using Skybox Solutions to Ensure PCI Compliance. Achieve efficient and effective PCI compliance by automating many required controls and processes

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

PCI DSS Requirements - Security Controls and Processes

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013

Technology Innovation Programme

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

March

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Using Skybox Solutions to Achieve PCI Compliance

NEW PENETRATION TESTING REQUIREMENTS, EXPLAINED

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

The Prioritized Approach to Pursue PCI DSS Compliance

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

Looking at the SANS 20 Critical Security Controls

Four Keys to Preparing for a PCI DSS 3.0 Assessment

NERC CIP VERSION 5 COMPLIANCE

STATE OF NEW JERSEY Security Controls Assessment Checklist

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Patch and Vulnerability Management Program

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

PCI DSS 3.1 Security Policy

Passing PCI Compliance How to Address the Application Security Mandates

Information Security Organizations trends are becoming increasingly reliant upon information technology in

SECURITY. Risk & Compliance Services

HIPAA: Compliance Essentials

Best Practices for PCI DSS V3.0 Network Security Compliance

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

PCI DSS Compliance Guide

Critical Controls for Cyber Security.

PCI DSS v3.0. Compliance Guide

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

The Payment Card Industry Data Security Standard

Office of Inspector General

Payment Card Industry (PCI) Data Security Standard

SANS Top 20 Critical Controls for Effective Cyber Defense

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

PCI DSS 3.2 PRIORITIZED CHECKLIST

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

The Protection Mission a constant endeavor

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

FISMA / NIST REVISION 3 COMPLIANCE

PII Compliance Guidelines

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

THE TOP 4 CONTROLS.

IT Assessment Procedures for Maxistar Medical Supplies Company. IT Assessment Procedures for Maxistar Medical Supplies Company

PCI Security Scan Procedures. Version 1.0 December 2004

AHS Flaw Remediation Standard

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Information Supplement: PCI DSS Wireless Guidelines

PCI Wireless Compliance with AirTight WIPS

Security Control Standard

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

PCI DATA SECURITY STANDARD OVERVIEW

SRA International Managed Information Systems Internal Audit Report

Cybersecurity Health Check At A Glance

CDM Vulnerability Management (VUL) Capability

Policy Pack Cross Reference to PCI DSS Version 3.1

PCI DSS 3.1 and the Impact on Wi-Fi Security

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Security Policy for External Customers

NOTICE: This publication is available at:

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 3.0 to 3.1

Payment Card Industry Compliance

General Standards for Payment Card Environments at Miami University

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Managed Service Solutions Catalogue. MANAGED SERVICES SOLUTIONS CATALOGUE MS Offering Overview June 2014

HIPAA Risk Analysis By: Matthew R. Johnson GIAC HIPAA Security Certificate (GHSC) Practical Assignment Version 1.0 Date: April 12, 2004

UNDERSTANDING PCI 3.0 AND HOW TO REDUCE YOUR SCOPE

Tagging PCI groups in OSSEC rules. PCI DSS Requirements v3.1 N/A N/A N/A N/A N/A N/A N/A N/A

White Paper. Common PCI Audit Mistakes. Seth Peter CTO, NetSPI. November Contents Why Mistakes Occur 2

New PCI Standards Enhance Security of Cardholder Data

Information Security Officer (# 1773) Salary: Grade 25 ($81,808-$102,167) / Grade 27 ($90,595 to $113,141) Summary of Duties. Minimum Qualifications

ADDENDUM #1 REQUEST FOR PROPOSALS

Transcription:

Checklist for Vulnerability Assessment

Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and unauthorized wireless access points on a quarterly basis. YES NO Note: Methods that may be used in the process include but are not limited to wireless network scans, physical/logical inspections of system components and infrastructure, network access control (NAC), or wireless IDS/IPS. Whichever methods are used, they must be sufficient to detect and identify both authorized and unauthorized devices. Examine policies and procedures to verify processes are defined for detection and identification of both authorized and unauthorized wireless access points on a quarterly basis. Verify that the methodology is adequate to detect and identify any unauthorized wireless access points, including at least the following: WLAN cards inserted into system components Portable or mobile devices attached to system components to create a wireless access point (for example, by USB, etc.) Wireless devices attached to a network port or network device. Examine output from recent wireless scans to verify that: Authorized and unauthorized wireless access points are identified, and The scan is performed at least quarterly for all system components and facilities. If automated monitoring is utilized (for example, wireless IDS/IPS, NAC, etc.), verify the configuration will generate alerts to notify personnel. Maintain an inventory of authorized wireless access points including a documented business justification. Examine documented records to verify that an inventory of authorized wireless access points is maintained and a business justification is documented for all authorized wireless access points. Implement incident response procedures in the event Copyright. All rights reserved. ecfirst. 2015 2

unauthorized wireless access points are detected. Examine the organization s incident response plan to verify it defines and requires a response in the event that an unauthorized wireless access point is detected. Interview responsible personnel and/or inspect recent wireless scans and related responses to verify action is taken when unauthorized wireless access points are found. Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades). Note: Multiple scan reports can be combined for the quarterly scan process to show that all systems were scanned and all applicable vulnerabilities have been addressed. Additional documentation may be required to verify non-remediated vulnerabilities are in the process of being addressed. Examine scan reports and supporting documentation to verify that internal and external vulnerability scans are performed as follows: Perform quarterly internal vulnerability scans and rescans as needed, until all high and medium risk vulnerabilities are resolved. Scans must be performed by qualified personnel. Review the scan reports and verify that four quarterly internal scans occurred in the most recent 12-month period. Review the scan reports and verify that the scan process includes rescans until all high and medium risk vulnerabilities identified are resolved. Interview personnel to verify that the scan was performed by a qualified internal resource(s) or qualified external third party, and if applicable, organizational independence of the tester exists. Perform quarterly external vulnerability scans. Perform rescans as needed, until passing scans are achieved. Copyright. All rights reserved. ecfirst. 2015 3

Review output from the four most recent quarters of external vulnerability scans and verify that four quarterly external vulnerability scans occurred in the most recent 12-month period. Review the results of each quarterly scan and rescan to verify that the remediation activities have been performed and successfully completed. Review the scan reports to verify that the scans were completed as per defined scope. Perform internal and external scans, and rescans as needed, after any significant change. Scans must be performed by qualified personnel. Inspect and correlate change control documentation and scan reports to verify that system components subject to any significant change were scanned. Review scan reports and verify that the scan process includes rescans until: For external scans, no vulnerabilities exist that are high or medium risk. For internal scans, all high and medium risk vulnerabilities are resolved. Validate that the scan was performed by a qualified internal resource(s) or qualified external third party, and if applicable, organizational independence of the tester exists. Implement a methodology for penetration testing that includes the following: Is based on industry-accepted penetration testing approaches Includes coverage for the entire perimeter that supports systems processing sensitive information and critical systems Includes testing from both inside and outside the network Includes testing to validate any segmentation and scope-reduction controls Defines application-layer penetration tests Defines network-layer penetration tests to include components that support network functions as well as operating systems Includes review and consideration of threats and vulnerabilities experienced in the last 12 months Copyright. All rights reserved. ecfirst. 2015 4

Specifies retention of penetration testing results and remediation activities results. Examine penetration-testing methodology and interview responsible personnel to verify a methodology is implemented that includes the following: Is based on industry-accepted penetration testing approaches (for example, NIST SP800-115) Includes coverage for the entire perimeter that supports systems processing sensitive information and critical systems Testing from both inside and outside the network Includes testing to validate any segmentation and scope-reduction controls Defines application-layer penetration tests Defines network-layer penetration tests to include components that support network functions as well as operating systems Includes review and consideration of threats and vulnerabilities experienced in the last 12 months Specifies retention of penetration testing results and remediation activities results. Perform external penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment). Examine the scope of work and results from the most recent external penetration test to verify that penetration testing is performed as follows: Per the defined methodology At least annually After any significant changes to the environment Verify that the test was performed by a qualified internal resource or qualified external third party, and if applicable, organizational independence of the tester exists. Perform internal penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment). Copyright. All rights reserved. ecfirst. 2015 5

Examine the scope of work and results from the most recent internal penetration test to verify that penetration testing is performed at least annually and after any significant changes to the environment. Per the defined methodology At least annually After any significant changes to the environment Verify that the test was performed by a qualified internal resource or qualified external third party, and if applicable, organizational independence of the tester exists. Exploitable vulnerabilities found during penetration testing are corrected and testing is repeated to verify the corrections. Examine penetration testing results to verify that noted exploitable vulnerabilities were corrected and that repeated testing confirmed the vulnerability was corrected. If segmentation is used to isolate segments with confidential information from other networks, perform penetration tests at least annually and after any changes to segmentation controls/methods to verify that the segmentation methods are operational and effective, and isolate all out-of-scope systems from in-scope systems. Examine segmentation controls and review penetration-testing methodology to verify that penetration-testing procedures are defined to test all segmentation methods to confirm they are operational and effective, and isolate all out-of-scope systems from in-scope systems. Examine the results from the most recent penetration test to verify that penetration testing to verify segmentation controls: Is performed at least annually and after any changes to segmentation controls/methods. Covers all segmentation controls/methods in use. Verifies that segmentation methods are operational and effective, and isolate all out-ofscope systems from in-scope systems. Figure 1: Checklist for Vulnerability Assessment. Copyright. All rights reserved. ecfirst. 2015 6

Corporate Office 295 NE Venture Drive Waukee, IA 50263 United States Toll Free: 877.899.9974 x17 Phone: 515.987.4044 x17 Fax: 515.978.2323 Copyright. All rights reserved. ecfirst. 2015 7