Security Assessment and Testing: CISSP, #6
2/5
()
About this ebook
Security Assessment and Testing is the 6th domain of the CISSP's common body of knowledge. In this course we will cover the following: assessment and testing strategies, security control effectiveness testing. security process data collection, test result analysis, third-party assessment and Information Security Continuous Monitoring (ISCM),
Selwyn Classen
A seasoned and highly qualified IT/IS professional with over 20 years working experience within the Petrochemical industry (i.e. Supply chain management, Knowledge management, Product and Quality management, Business analysis and processing) including the Telecommunications industry.
Other titles in Security Assessment and Testing Series (8)
Security and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsCommunication and Network Security: CISSP, #4 Rating: 0 out of 5 stars0 ratingsIdentity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Software Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratings
Read more from Selwyn Classen
Risk Management and Information Systems Control Rating: 5 out of 5 stars5/5Incident Management Rating: 0 out of 5 stars0 ratings
Related to Security Assessment and Testing
Titles in the series (8)
Security and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Asset Security: CISSP, #2 Rating: 0 out of 5 stars0 ratingsSecurity Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsCommunication and Network Security: CISSP, #4 Rating: 0 out of 5 stars0 ratingsIdentity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratingsSecurity Assessment and Testing: CISSP, #6 Rating: 2 out of 5 stars2/5Software Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratings
Related ebooks
Security Engineering: CISSP, #3 Rating: 0 out of 5 stars0 ratingsSoftware Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsSecurity and Risk Management: CISSP, #1 Rating: 4 out of 5 stars4/5Identity and Access Management: CISSP, #5 Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsBuilding a Life and Career in Security Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 5 out of 5 stars5/5Enterprise Security: A Data-Centric Approach to Securing the Enterprise Rating: 0 out of 5 stars0 ratingsCybersecurity: Issues of Today, a Path for Tomorrow Rating: 0 out of 5 stars0 ratingsModern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Rating: 0 out of 5 stars0 ratingsInformation Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsSecurity controls Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsThe Language of Cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity Jobs 3- in-1 Value Bundle: Resume, Career Paths, and Work From Home Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-601 Rating: 0 out of 5 stars0 ratingsCybersecurity Jobs: Resume Marketing: Find Cybersecurity Jobs, #1 Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Review Guide: Exam SY0-501 Rating: 1 out of 5 stars1/5(ISC)2 SSCP Systems Security Certified Practitioner Official Study Guide Rating: 0 out of 5 stars0 ratingsSecuring Critical Infrastructures Rating: 0 out of 5 stars0 ratingsAuditing Information Systems: Enhancing Performance of the Enterprise Rating: 0 out of 5 stars0 ratingsFundamentals of Information Security Risk Management Auditing: An introduction for managers and auditors Rating: 5 out of 5 stars5/5CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003 Rating: 0 out of 5 stars0 ratingsCISA Certified Information Systems Auditor All-in-One Exam Guide, Third Edition Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratingsInformation Security Auditor: Careers in information security Rating: 0 out of 5 stars0 ratingsCybersecurity First Principles: A Reboot of Strategy and Tactics Rating: 5 out of 5 stars5/5Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Codes and Ciphers Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Metasploit Bootcamp Rating: 5 out of 5 stars5/5Deep Dive: Exploring the Real-world Value of Open Source Intelligence Rating: 0 out of 5 stars0 ratingsHow to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Alice and Bob Learn Application Security Rating: 0 out of 5 stars0 ratingsCompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for Security Assessment and Testing
1 rating0 reviews
Book preview
Security Assessment and Testing - Selwyn Classen
While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
SECURITY ASSESSMENT AND TESTING
First edition. April 2, 2020.
Copyright © 2020 Selwyn Classen.
Written by Selwyn Classen.
Table of Contents
Assessment and Testing Strategies
Course Introduction
Ensuring Objectives Have Been Met
Resource Constraints
Security Assessment Foundations
Security Assessment Program
Assessment Viewpoints
Assessment Types
Summary
Security Control Effectiveness Testing
Introduction
Vulnerability Assessment
Detection
Identification
Analysis
Reporting
Mitigation
Intro to Penetration Testing
Penetration Testing
Test Process Walkthrough
Selecting Target Surface
Destructing and Non-destructive Testing
Penetration Testing Frameworks
CISSP Exam Tip
Penetration Testing Process
Scoping the Test
Enumeration
Identification
Security Assessment Techniques
Source Code Review
Summary
Security Process Data Collection
Introduction
Key Performance Risk Indicators
Management Review
Training and Awareness
Account Management
Disaster Recovery and Business Continuity
Backup Data Verification
Summary
Test Result Analysis
Introduction
Vulnerability Assessment
Vulnerability Assessment Dashboards
Targeted Reporting
Data Analysis
Penetration Testing Reports
Reporting Challenges
Penetration Testing Report Anatomy
Summary
Third-party Assessment
Introduction
Third-party Vendors
Evaluating Guidelines
Audit Reports
SSAE16
Audit Stages
Summary
Information Security Continuous Monitoring
Introduction
What Is ISCM?
ISCM Strategy
Defining Your ISCM Program Strategy
Establishing Your ISCM Program Strategy
Implementing Your ISCM Program Strategy
Analyzing Your ISCM Program Strategy
Respond to ISCM Findings
Review Your ISCM Program Strategy
Summary
Assessment and Testing Strategies
Course Introduction
Let us assume that your controls have been selected and implemented, your users have been educated, and everything seems to be in order. Even if this is the case, the odds are that there are still unknown risks in your environment and if you want to be confident that your controls are working as intended, you will need to perform security and risk assessment. If you take a look at the CISSP exam outline, you will find that a CISSP candidate will be expected to understand how to design and validate assessments and test strategies, conduct security control testing, collect security control data, analyze and report test outputs, and conduct or facilitate internal and third-party audits. The requirements that were just listed all stem from the very same need.
Let me give you a quick example of this. Depending on the size of the organization, there is a chance that many employees believe that all necessary security controls are already in place. Unfortunately, this is simply an assumption and one that is often incorrect. As a security professional, you may need to provide your leadership with the assurance that your systems are secure and to do that; you will need to have effective and repeatable security testing and assessment processes in place. In this module and throughout the entire course, you are going to learn what this entails. Security testing will require that you leverage all of the information that you have learned in the other CISSP domains. You may be asked to work with product owners to build out procedures and processes that validate the effectiveness of security controls. When planning for testing and creating your test strategies, you may be required to work with product owners to build out procedures and processes that validate the effectiveness of security controls.
Now that you have a basic understanding of what ISE Squared expects a candidate to know in regards to security assessment and testing. Let us go ahead and get started on the first topic of this course, assessment and testing strategies. This module attempts to cover the broad spectrum of security assessment and testing-related ideas, concepts, and terminology that is the foundation for any advanced security professional. This course module also reinforces your existing security assessment knowledge and will focus on the concepts necessary for adequately designing and validating security assessments. Now, although this course does not contain technological demonstrations, much of the information that will be shared should be immediately useful when you are planning for or even executing your security assessments.
You will learn why developing a strategy for security assessment, and testing is important and what the different assessment types are and what you should know in regards to resources and how they might impact your assessments. You will also learn about the overall security testing and assessment process so that you can be both effective and efficient when developing your strategies.
Ensuring Objectives Have Been Met
Information security assessment is an activity that is focused on assuring that security objectives have been met. This can be accomplished by testing your environment and validating that everything is working the way that you had originally planned when performing due diligence. This could include the security objectives that are driven by regulatory requirements, or it could be the items that are in your organizational policies. Security testing will ensure that your controls are working properly, and when they do not, it will help you to identify those areas