SlideShare a Scribd company logo
The Security Vulnerability
Assessment Process, Best
 Practices & Challenges
                  1




  Kellep A. Charles, CISA, CISSP




          www.SecurityOrb.com
Agenda
                             2

๏‚—About Me
๏‚—Topic Introduction
๏‚—The Process
๏‚—The Best Practices/Challenges
๏‚—Conclusion




                      www.SecurityOrb.com
About Me
                                      3

๏‚—Kellep Charles but you can call me K.C.
๏‚—Government contractor in the DC area
๏‚—Served as an adjunct professor
๏‚—Doctoral Student
 ๏‚ก   Research area:
     ๏ƒท   Human Computer Interaction-Security HCI-Sec
     ๏ƒท   Honeypot & Artificial Neural Networks
๏‚—Operate SecurityOrb.com




                               www.SecurityOrb.com
Introduction
                                      4

๏‚—Security vulnerability assessments have become an
  imperative part of any organizationโ€™s computer and
  network security posture.

๏‚—Many organizations consist of:
 ๏‚ก Heterogeneous computing environments
      ๏ƒท   Windows, Mac OS X, Linux/Unix
  ๏‚ก   Multiple Applications
  ๏‚ก Distributed computing
  ๏‚ก Internet-enabled information access systems.


๏‚— The need to understand the state of an organizationโ€™s
  overall information system is ever more important now.
                               www.SecurityOrb.com
Introduction
                                     5

๏‚—Best practices in information security acknowledge
 ๏‚ก   a defensive only approach to securing an enterprise does
     not suffice
 ๏‚ก   at times is considered inadequate.


๏‚—Frequently these defensive security devices such as
 firewalls and intrusion detection systems (IDS)
 ๏‚ก   often not configured properly
 ๏‚ก   not capable of locating all the vulnerabilities and threats on
     the network, especially at the node level.

                              www.SecurityOrb.com
Introduction
                                6

๏‚—Performing regular security vulnerability assessment
 helps bridge that gap

๏‚—Allows an organization to take a proactive stance
 towards protecting their information computing
 environment.

๏‚—The bottom line objective is to safeguard the core
 intellectual and electronic assets of the organization,
 and to ensure compliance with appropriate
 regulations
                         www.SecurityOrb.com
Why Is It So Vital?
                                   7

๏‚—Most Systems are unpatched
 ๏‚ก   Lazy, overworked or misinformed system administrators
๏‚—Most compromises are from unpatched systems with
 patches or work around available
๏‚—Some systems cannot be patched (allow for alternate
 defense)
๏‚—Proactive and offensive posture towards security
๏‚—Compliance




                            www.SecurityOrb.com
Assessment Levels
                                    8

๏‚— Basic Security Assessment - The objective for this assessment
  is to give the responsible party a basic understanding of the
  security of the business as a whole in three key areas:
  Administrative, Physical and Technical Safeguards. It is
  meant to point out possible areas of weakness with a walk
  through of the facility and a Q&A session. It is not an in-depth
  study, rather, a basic first step in protecting information.

๏‚— In-depth Security Assessment - This is a comprehensive study
  of the security of your business. We will analyze all policies
  and procedures, router access lists, Firewall configurations
  and policies, PC and server configurations, complete Website
  review, complete mail server review. We will then present the
  client with a written report of our findings. This type of
  assessment will give you a thorough understanding of how
  your company measures up to "Industry Best Practices".
                             www.SecurityOrb.com
Assessment Levels
                                   9


๏‚—External Vulnerability Testing - We will test your network
from the outside from a "hacker's point-of-view". We will use
the same tools criminals use to try and compromise your
network and servers.

๏‚—Internal Vulnerability Testing - These are the same tools
used in the External test. This type of assessment is essential
in understanding how and why hackers, viruses and worms
spread so quickly through an organization.




                            www.SecurityOrb.com
Assessment Process
                                        10
๏‚—   To effectively conduct a security assessment so it is beneficial to an
    organization
    ๏‚ก a proven methodology must be followed so the assessors and
      assesses are on the same page.

๏‚— Using a proven security assessment methodology supplies a
    blueprint of events from start-to-finish that can be examined,
    tracked and replicated.

๏‚— Reports that are constructed from the security assessments are used
    to provide a snap shot view of information system deficiencies for
    short-term analysis as well as trending data for long-term evaluation

๏‚— Allowing the organization to understand their vulnerabilities so they
    can better protect themselves from current and future threats.

                                  www.SecurityOrb.com
Security Assessment Process
                                    11

๏‚—The process includes the following 6 phases
 ๏‚ก   Pre Security Assessment Process
 ๏‚ก   Security Assessment In-Brief
 ๏‚ก   Security Assessment Field Work
 ๏‚ก   Security Assessment Report Analysis & Preparation
 ๏‚ก   Security Assessment Out-Brief
 ๏‚ก   Post Security Assessment Process




                             www.SecurityOrb.com
Security Assessment Process
                                   12

๏‚—Pre-Security Assessment Process


 ๏‚ก   The pre-security assessment process entails one of the most
     important aspects of conducting a security assessment.
     Obtaining an engagement letter grants the assessment
     team the authority to commence with the formal processes
     of creating documentation to support the security
     assessment, permission for the onsite visit and the overall
     authority to conduct the security assessment.




                            www.SecurityOrb.com
Security Assessment Process
                                     13

๏‚—Security Assessment In-Brief


 ๏‚ก   Once the team has arrived at the assessment location, a
     security assessment in-brief is required. In the in-brief, both
     the security assessment team and the organizational staff
     members will introduce themselves and the roles they will have
     during the security assessment process.




                              www.SecurityOrb.com
Security Assessment Process
                                    14

๏‚—Security Assessment Field Work (Scanning,
 Interview, Walk-Thru and Doc Review)

 ๏‚ก   Once the in brief has been review, discussed, completed and
     agreed upon, the security assessment fieldwork can
     commence. The security assessment field-work process consist
     of conducting vulnerability scans, facility walkthrough, manual
     system checks, staff interview and various document reviews.




                              www.SecurityOrb.com
Security Assessment Process
                                    15

๏‚—Security Assessment Report Analysis &
 Preparation

 ๏‚ก   Towards the end of the security assessment, once all of the
     security assessment fieldwork has been completed, the
     security assessment team will review and process the
     information in preparation of the final report. During this
     phase, the security assessment team will address any false
     positive, document any variances and findings that will be
     included in the final report.




                             www.SecurityOrb.com
Security Assessment Process
                        16

๏‚—Security Assessment Report Analysis &
 Preparation




                  www.SecurityOrb.com
Security Assessment Process
                                 17

๏‚— Security Assessment Report Analysis & Preparation




                          www.SecurityOrb.com
Security Assessment Process
                                   18

๏‚—Security Assessment Out-Brief

 ๏‚ก   The security assessment team will provide
     recommendations as well.

 ๏‚ก   Contact information will be on the out-brief.

 ๏‚ก   This process should be interactive were questions are
     taken through out the security assessment out-brief.

 ๏‚ก   At the end of the security assessment out-brief, both
     parties will have to sign the pages of the out-brief and
     discuss what will be occurring in the post security
     assessment process.
                             www.SecurityOrb.com
Security Assessment Process
                                       19

๏‚—Security Assessment Out-Brief

 ๏‚ก   The security assessment team will provide recommendations as well.

 ๏‚ก   Contact information will be on the out-brief.

 ๏‚ก   This process should be interactive were questions are taken through
     out the security assessment out-brief.

 ๏‚ก   At the end of the security assessment out-brief, both parties will have
     to sign the pages of the out-brief and discuss what will be occurring
     in the post security assessment process.




                                 www.SecurityOrb.com
Security Assessment Process
                                  20

๏‚—Post Security Assessment Process


 ๏‚ก   The post security assessment process is where the security
     assessment team securely files all documentation and
     electronic data pertaining to the organization in which the
     security assessment was conducted on.
 ๏‚ก   In addition, a team meeting with all members of the
     assessment team should be conducted to review and lessons
     learned to add any improvements or deficiencies to the
     process.


                            www.SecurityOrb.com
Vulnerability Assessment, Penetration Test &
                Security Audit
                                          21

๏‚— A vulnerability assessment is a practice used to identify all potential
   vulnerabilities that could be exploited in an environment.
   ๏‚ก The assessment can be used to evaluate physical security, personnel (testing
     through social engineering and such), or system and network security.

๏‚— While a vulnerability assessment's goal is to identify all vulnerabilities in an
   environment, a penetration test has the goal of "breaking into the network."
   ๏‚ก only needs to exploit one or two vulnerabilities to actually penetrate the
     environment.
   ๏‚ก Penetration testing is also referred to as ethical hacking



๏‚— A security audit is basically someone going around with a criteria checklist of
   things that should be done or in place to ensure that the company is in
   compliance with its security policy, regulations and legal responsibilities.


www.SecurityOrb.com
Credential Scans vs Un-credential Scans
                                   22

๏‚—Credentialed scanning allows for a much more
   accurate and thorough picture of the system.
   ๏‚ก   Mechanic and doctor example


๏‚—Part of vulnerability scanning is to identify missing
   patches that leave a machine open to compromise.

๏‚— Test of a Windows 7 system
   ๏‚ก   The results speak for themselves: first scan without
       credentials, then with credentials โ€“ What do you think you will
       see?
www.SecurityOrb.com
Credential Scans vs Un-credential Scans
                                          23

๏‚— Test of a Windows 7 system
   ๏‚ก   The results speak for themselves: without credentials, the scan identified
       highs=0; meds=0; lows=1. With credentials: highs=7; meds=8; lows=5
   ๏‚ก   Guess which one is more accurate.




www.SecurityOrb.com
Credential Scans vs Un-credential Scans
                        24




www.SecurityOrb.com
Credential Scans vs. Un-credential Scans
                        25




www.SecurityOrb.com
System Hardening
                                             26

๏‚— Center for Internet Security (CIS) Benchmarks
   ๏‚ก provides standards and metrics that dramatically raise the level of security to ensure
     the integrity of the public and private Internet-based functions on which society
     increasingly depends.
๏‚— Federal Desktop Core Configuration (FDCC)
  ๏‚ก A list of security settings recommended by the National Institute of Standards and
     Technology for general-purpose microcomputers that are connected directly to the
     network of a United States government agency.
๏‚— Security Technical Implementation Guide (STIG)
  ๏‚ก DISAโ€™s methodology for standardized secure installation and maintenance of
     computer software and hardware.
๏‚— Security Content Automation Protocol (SCAP)
  ๏‚ก a method for using specific standards to enable automated vulnerability management,
     measurement, and policy compliance evaluation (e.g., FISMA compliance). The
     National Vulnerability Database (NVD) is the U.S. government content repository for
     SCAP.
๏‚— Some items may have to be changed to obtain credential scans

www.SecurityOrb.com
Vulnerability Management
                                 27

๏‚— The repeated practice of identifying, classifying, remediating, and
  mitigating
๏‚— Prioritize
๏‚— Mitigate Vulnerabilities - Ultimately, the root causes of
  vulnerabilities must be addressed. This is often done via patching
  vulnerable services, changing vulnerable configurations or
  making application updates to remove vulnerable code.
๏‚— Maintain and Monitor - Organizations' computing
  environments are dynamic and evolve over time, vulnerability
  management is an ongoing process rather than a point-in-time
  event.



www.SecurityOrb.com
Compliance
                          28

๏‚— Regulatory Bodies




www.SecurityOrb.com
Other Things to Consider
                                 29

๏‚—Virtualization
๏‚—Cloud Computing
๏‚—Politics
๏‚—Reoccurring Scans
๏‚—Distributed Scanning
๏‚—Patch Management
๏‚—Penetration Testing




www.SecurityOrb.com
What Vulnerability Scanning Canโ€™t Do
                         30

๏‚—Find Zero-Days and malware
๏‚—Eliminates the most obvious and known security
 threats.
๏‚—Canโ€™t Patch
๏‚—Determine the difference between False
 Positive/Negative




www.SecurityOrb.com
Conclusion

๏‚—The art of defending an organizational network takes
 many approaches to be done successfully.
๏‚—No one control can assure that the network is safe.
 Firewalls are great for prevention, IDS offer the
 ability for detection, Security Awareness briefing
 provides for user knowledge and Security
 Assessments assist with a proactive posture towards
 security.
๏‚—It also helps prove you've done "due diligence" in
 performing basic system patches and fixing the well-
 known problems in case a security breach causes
 financial, legal or regulatory problems.
32




   Thank Youโ€ฆ
@kellepc           @securityorb


           www.SecurityOrb.com
Ad

More Related Content

What's hot (20)

Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad
ย 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
ShivamSharma909
ย 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
Dedi Dwianto
ย 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
ย 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
Mohammed Adam
ย 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
ย 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
n|u - The Open Security Community
ย 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
ย 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
PencilData
ย 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
ย 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
ย 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Sergey Soldatov
ย 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
Prime Infoserv
ย 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
ย 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
ย 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
ย 
MITRE ATT&CK Framework
MITRE ATT&CK FrameworkMITRE ATT&CK Framework
MITRE ATT&CK Framework
n|u - The Open Security Community
ย 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
ย 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
ย 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
ย 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
asherad
ย 
CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1CompTIA Security+ SY0-601 Domain 1
CompTIA Security+ SY0-601 Domain 1
ShivamSharma909
ย 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
Dedi Dwianto
ย 
Introduction to penetration testing
Introduction to penetration testingIntroduction to penetration testing
Introduction to penetration testing
Nezar Alazzabi
ย 
Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics Vulnerability assessment & Penetration testing Basics
Vulnerability assessment & Penetration testing Basics
Mohammed Adam
ย 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Ulf Mattsson
ย 
Penetration testing reporting and methodology
Penetration testing reporting and methodologyPenetration testing reporting and methodology
Penetration testing reporting and methodology
Rashad Aliyev
ย 
Introduction to QRadar
Introduction to QRadarIntroduction to QRadar
Introduction to QRadar
PencilData
ย 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
LearningwithRayYT
ย 
Vulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration TestingVulnerability and Assessment Penetration Testing
Vulnerability and Assessment Penetration Testing
Yvonne Marambanyika
ย 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
Sergey Soldatov
ย 
VAPT Services by prime
VAPT Services by primeVAPT Services by prime
VAPT Services by prime
Prime Infoserv
ย 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
ย 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
sommerville-videos
ย 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
Amir Hossein Zargaran
ย 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
ย 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
ย 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
ย 

Similar to The Security Vulnerability Assessment Process & Best Practices (20)

New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
ย 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
Ram Srivastava
ย 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
Ihor Uzhvenko
ย 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
ย 
Information Security and the SDLC
Information Security and the SDLCInformation Security and the SDLC
Information Security and the SDLC
BDPA Charlotte - Information Technology Thought Leaders
ย 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
EnterpriseGRC Solutions, Inc.
ย 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
NathanDjami
ย 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
Nutan Kumar Panda
ย 
Auditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterpriseAuditing-Cybersecurity in the enterprise
Auditing-Cybersecurity in the enterprise
Thilak Pathirage -Senior IT Gov and Risk Consultant
ย 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
jatniwalafizza786
ย 
Cyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdfCyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdf
InfosecTrain
ย 
Cybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdfCybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdf
infosec train
ย 
Cybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdfCybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdf
infosecTrain
ย 
Cybersecurity Analyst Interview Questions By InfosecTrain
Cybersecurity Analyst Interview Questions By InfosecTrainCybersecurity Analyst Interview Questions By InfosecTrain
Cybersecurity Analyst Interview Questions By InfosecTrain
priyanshamadhwal2
ย 
Cyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paperCyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paper
InfosecTrain
ย 
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
Mansi Kandari
ย 
Cybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdfCybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdf
infosec train
ย 
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
infosecTrain
ย 
InfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview QuestionsInfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview Questions
priyanshamadhwal2
ย 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
Arun Prabhakar
ย 
New Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise InfilterationNew Age Red Teaming - Enterprise Infilteration
New Age Red Teaming - Enterprise Infilteration
Shritam Bhowmick
ย 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
Ram Srivastava
ย 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
Ihor Uzhvenko
ย 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
ย 
Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016Security assessment isaca sv presentation jan 2016
Security assessment isaca sv presentation jan 2016
EnterpriseGRC Solutions, Inc.
ย 
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdfCisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
Cisco_eBook_ShiftLeftSecurity_2022_06_07a.pdf
NathanDjami
ย 
Backtrack manual Part1
Backtrack manual Part1Backtrack manual Part1
Backtrack manual Part1
Nutan Kumar Panda
ย 
Exploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity TestingExploring the Key Types of Cybersecurity Testing
Exploring the Key Types of Cybersecurity Testing
jatniwalafizza786
ย 
Cyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdfCyber Security Interview Analyst Questions.pdf
Cyber Security Interview Analyst Questions.pdf
InfosecTrain
ย 
Cybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdfCybersecurity Analyst Interview Questions.pdf
Cybersecurity Analyst Interview Questions.pdf
infosec train
ย 
Cybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdfCybersecurity Analyst Interview Questions and Answers.pdf
Cybersecurity Analyst Interview Questions and Answers.pdf
infosecTrain
ย 
Cybersecurity Analyst Interview Questions By InfosecTrain
Cybersecurity Analyst Interview Questions By InfosecTrainCybersecurity Analyst Interview Questions By InfosecTrain
Cybersecurity Analyst Interview Questions By InfosecTrain
priyanshamadhwal2
ย 
Cyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paperCyber Security Analyst Interview Questions: Download our white paper
Cyber Security Analyst Interview Questions: Download our white paper
InfosecTrain
ย 
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
๐“๐จ๐ฉ ๐‚๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ญ ๐ˆ๐ง๐ญ๐ž๐ซ๐ฏ๐ข๐ž๐ฐ ๐๐ฎ๐ž๐ฌ๐ญ๐ข๐จ๐ง๐ฌ: ๐ƒ๐จ๐ฐ๐ง๐ฅ๐จ๐š๐ ๐Ž๐ฎ๐ซ ๐—ช๐—ต๐—ถ๐˜๐—ฒ ๐—ฃ๐—ฎ๐—ฝ๐—ฒ๐—ฟ!
Mansi Kandari
ย 
Cybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdfCybersecurity Analyst Interview Questions for 2024.pdf
Cybersecurity Analyst Interview Questions for 2024.pdf
infosec train
ย 
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
Top Cybersecurity Analyst Interview Questions: Download InfosecTrainโ€™s White ...
infosecTrain
ย 
InfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview QuestionsInfosecTrain Cybersecurity Analyst Interview Questions
InfosecTrain Cybersecurity Analyst Interview Questions
priyanshamadhwal2
ย 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
Arun Prabhakar
ย 
Ad

Recently uploaded (20)

Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
ย 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
ย 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
ย 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
ย 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
ย 
Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.Greenhouse_Monitoring_Presentation.pptx.
Greenhouse_Monitoring_Presentation.pptx.
hpbmnnxrvb
ย 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
ย 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
ย 
Cybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure ADCybersecurity Identity and Access Solutions using Azure AD
Cybersecurity Identity and Access Solutions using Azure AD
VICTOR MAESTRE RAMIREZ
ย 
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdfSAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
SAP Modernization: Maximizing the Value of Your SAP S/4HANA Migration.pdf
Precisely
ย 
Linux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdfLinux Professional Institute LPIC-1 Exam.pdf
Linux Professional Institute LPIC-1 Exam.pdf
RHCSA Guru
ย 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
ย 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
ย 
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul Shares 5 Steps to Implement AI Agents for Maximum Business Efficien...
Noah Loul
ย 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
ย 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
ย 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
ย 
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptxIncreasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Increasing Retail Store Efficiency How can Planograms Save Time and Money.pptx
Anoop Ashok
ย 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
ย 
How analogue intelligence complements AI
How analogue intelligence complements AIHow analogue intelligence complements AI
How analogue intelligence complements AI
Paul Rowe
ย 
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In FranceManifest Pre-Seed Update | A Humanoid OEM Deeptech In France
Manifest Pre-Seed Update | A Humanoid OEM Deeptech In France
chb3
ย 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
ย 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
ย 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
ย 
Ad

The Security Vulnerability Assessment Process & Best Practices

  • 1. The Security Vulnerability Assessment Process, Best Practices & Challenges 1 Kellep A. Charles, CISA, CISSP www.SecurityOrb.com
  • 2. Agenda 2 ๏‚—About Me ๏‚—Topic Introduction ๏‚—The Process ๏‚—The Best Practices/Challenges ๏‚—Conclusion www.SecurityOrb.com
  • 3. About Me 3 ๏‚—Kellep Charles but you can call me K.C. ๏‚—Government contractor in the DC area ๏‚—Served as an adjunct professor ๏‚—Doctoral Student ๏‚ก Research area: ๏ƒท Human Computer Interaction-Security HCI-Sec ๏ƒท Honeypot & Artificial Neural Networks ๏‚—Operate SecurityOrb.com www.SecurityOrb.com
  • 4. Introduction 4 ๏‚—Security vulnerability assessments have become an imperative part of any organizationโ€™s computer and network security posture. ๏‚—Many organizations consist of: ๏‚ก Heterogeneous computing environments ๏ƒท Windows, Mac OS X, Linux/Unix ๏‚ก Multiple Applications ๏‚ก Distributed computing ๏‚ก Internet-enabled information access systems. ๏‚— The need to understand the state of an organizationโ€™s overall information system is ever more important now. www.SecurityOrb.com
  • 5. Introduction 5 ๏‚—Best practices in information security acknowledge ๏‚ก a defensive only approach to securing an enterprise does not suffice ๏‚ก at times is considered inadequate. ๏‚—Frequently these defensive security devices such as firewalls and intrusion detection systems (IDS) ๏‚ก often not configured properly ๏‚ก not capable of locating all the vulnerabilities and threats on the network, especially at the node level. www.SecurityOrb.com
  • 6. Introduction 6 ๏‚—Performing regular security vulnerability assessment helps bridge that gap ๏‚—Allows an organization to take a proactive stance towards protecting their information computing environment. ๏‚—The bottom line objective is to safeguard the core intellectual and electronic assets of the organization, and to ensure compliance with appropriate regulations www.SecurityOrb.com
  • 7. Why Is It So Vital? 7 ๏‚—Most Systems are unpatched ๏‚ก Lazy, overworked or misinformed system administrators ๏‚—Most compromises are from unpatched systems with patches or work around available ๏‚—Some systems cannot be patched (allow for alternate defense) ๏‚—Proactive and offensive posture towards security ๏‚—Compliance www.SecurityOrb.com
  • 8. Assessment Levels 8 ๏‚— Basic Security Assessment - The objective for this assessment is to give the responsible party a basic understanding of the security of the business as a whole in three key areas: Administrative, Physical and Technical Safeguards. It is meant to point out possible areas of weakness with a walk through of the facility and a Q&A session. It is not an in-depth study, rather, a basic first step in protecting information. ๏‚— In-depth Security Assessment - This is a comprehensive study of the security of your business. We will analyze all policies and procedures, router access lists, Firewall configurations and policies, PC and server configurations, complete Website review, complete mail server review. We will then present the client with a written report of our findings. This type of assessment will give you a thorough understanding of how your company measures up to "Industry Best Practices". www.SecurityOrb.com
  • 9. Assessment Levels 9 ๏‚—External Vulnerability Testing - We will test your network from the outside from a "hacker's point-of-view". We will use the same tools criminals use to try and compromise your network and servers. ๏‚—Internal Vulnerability Testing - These are the same tools used in the External test. This type of assessment is essential in understanding how and why hackers, viruses and worms spread so quickly through an organization. www.SecurityOrb.com
  • 10. Assessment Process 10 ๏‚— To effectively conduct a security assessment so it is beneficial to an organization ๏‚ก a proven methodology must be followed so the assessors and assesses are on the same page. ๏‚— Using a proven security assessment methodology supplies a blueprint of events from start-to-finish that can be examined, tracked and replicated. ๏‚— Reports that are constructed from the security assessments are used to provide a snap shot view of information system deficiencies for short-term analysis as well as trending data for long-term evaluation ๏‚— Allowing the organization to understand their vulnerabilities so they can better protect themselves from current and future threats. www.SecurityOrb.com
  • 11. Security Assessment Process 11 ๏‚—The process includes the following 6 phases ๏‚ก Pre Security Assessment Process ๏‚ก Security Assessment In-Brief ๏‚ก Security Assessment Field Work ๏‚ก Security Assessment Report Analysis & Preparation ๏‚ก Security Assessment Out-Brief ๏‚ก Post Security Assessment Process www.SecurityOrb.com
  • 12. Security Assessment Process 12 ๏‚—Pre-Security Assessment Process ๏‚ก The pre-security assessment process entails one of the most important aspects of conducting a security assessment. Obtaining an engagement letter grants the assessment team the authority to commence with the formal processes of creating documentation to support the security assessment, permission for the onsite visit and the overall authority to conduct the security assessment. www.SecurityOrb.com
  • 13. Security Assessment Process 13 ๏‚—Security Assessment In-Brief ๏‚ก Once the team has arrived at the assessment location, a security assessment in-brief is required. In the in-brief, both the security assessment team and the organizational staff members will introduce themselves and the roles they will have during the security assessment process. www.SecurityOrb.com
  • 14. Security Assessment Process 14 ๏‚—Security Assessment Field Work (Scanning, Interview, Walk-Thru and Doc Review) ๏‚ก Once the in brief has been review, discussed, completed and agreed upon, the security assessment fieldwork can commence. The security assessment field-work process consist of conducting vulnerability scans, facility walkthrough, manual system checks, staff interview and various document reviews. www.SecurityOrb.com
  • 15. Security Assessment Process 15 ๏‚—Security Assessment Report Analysis & Preparation ๏‚ก Towards the end of the security assessment, once all of the security assessment fieldwork has been completed, the security assessment team will review and process the information in preparation of the final report. During this phase, the security assessment team will address any false positive, document any variances and findings that will be included in the final report. www.SecurityOrb.com
  • 16. Security Assessment Process 16 ๏‚—Security Assessment Report Analysis & Preparation www.SecurityOrb.com
  • 17. Security Assessment Process 17 ๏‚— Security Assessment Report Analysis & Preparation www.SecurityOrb.com
  • 18. Security Assessment Process 18 ๏‚—Security Assessment Out-Brief ๏‚ก The security assessment team will provide recommendations as well. ๏‚ก Contact information will be on the out-brief. ๏‚ก This process should be interactive were questions are taken through out the security assessment out-brief. ๏‚ก At the end of the security assessment out-brief, both parties will have to sign the pages of the out-brief and discuss what will be occurring in the post security assessment process. www.SecurityOrb.com
  • 19. Security Assessment Process 19 ๏‚—Security Assessment Out-Brief ๏‚ก The security assessment team will provide recommendations as well. ๏‚ก Contact information will be on the out-brief. ๏‚ก This process should be interactive were questions are taken through out the security assessment out-brief. ๏‚ก At the end of the security assessment out-brief, both parties will have to sign the pages of the out-brief and discuss what will be occurring in the post security assessment process. www.SecurityOrb.com
  • 20. Security Assessment Process 20 ๏‚—Post Security Assessment Process ๏‚ก The post security assessment process is where the security assessment team securely files all documentation and electronic data pertaining to the organization in which the security assessment was conducted on. ๏‚ก In addition, a team meeting with all members of the assessment team should be conducted to review and lessons learned to add any improvements or deficiencies to the process. www.SecurityOrb.com
  • 21. Vulnerability Assessment, Penetration Test & Security Audit 21 ๏‚— A vulnerability assessment is a practice used to identify all potential vulnerabilities that could be exploited in an environment. ๏‚ก The assessment can be used to evaluate physical security, personnel (testing through social engineering and such), or system and network security. ๏‚— While a vulnerability assessment's goal is to identify all vulnerabilities in an environment, a penetration test has the goal of "breaking into the network." ๏‚ก only needs to exploit one or two vulnerabilities to actually penetrate the environment. ๏‚ก Penetration testing is also referred to as ethical hacking ๏‚— A security audit is basically someone going around with a criteria checklist of things that should be done or in place to ensure that the company is in compliance with its security policy, regulations and legal responsibilities. www.SecurityOrb.com
  • 22. Credential Scans vs Un-credential Scans 22 ๏‚—Credentialed scanning allows for a much more accurate and thorough picture of the system. ๏‚ก Mechanic and doctor example ๏‚—Part of vulnerability scanning is to identify missing patches that leave a machine open to compromise. ๏‚— Test of a Windows 7 system ๏‚ก The results speak for themselves: first scan without credentials, then with credentials โ€“ What do you think you will see? www.SecurityOrb.com
  • 23. Credential Scans vs Un-credential Scans 23 ๏‚— Test of a Windows 7 system ๏‚ก The results speak for themselves: without credentials, the scan identified highs=0; meds=0; lows=1. With credentials: highs=7; meds=8; lows=5 ๏‚ก Guess which one is more accurate. www.SecurityOrb.com
  • 24. Credential Scans vs Un-credential Scans 24 www.SecurityOrb.com
  • 25. Credential Scans vs. Un-credential Scans 25 www.SecurityOrb.com
  • 26. System Hardening 26 ๏‚— Center for Internet Security (CIS) Benchmarks ๏‚ก provides standards and metrics that dramatically raise the level of security to ensure the integrity of the public and private Internet-based functions on which society increasingly depends. ๏‚— Federal Desktop Core Configuration (FDCC) ๏‚ก A list of security settings recommended by the National Institute of Standards and Technology for general-purpose microcomputers that are connected directly to the network of a United States government agency. ๏‚— Security Technical Implementation Guide (STIG) ๏‚ก DISAโ€™s methodology for standardized secure installation and maintenance of computer software and hardware. ๏‚— Security Content Automation Protocol (SCAP) ๏‚ก a method for using specific standards to enable automated vulnerability management, measurement, and policy compliance evaluation (e.g., FISMA compliance). The National Vulnerability Database (NVD) is the U.S. government content repository for SCAP. ๏‚— Some items may have to be changed to obtain credential scans www.SecurityOrb.com
  • 27. Vulnerability Management 27 ๏‚— The repeated practice of identifying, classifying, remediating, and mitigating ๏‚— Prioritize ๏‚— Mitigate Vulnerabilities - Ultimately, the root causes of vulnerabilities must be addressed. This is often done via patching vulnerable services, changing vulnerable configurations or making application updates to remove vulnerable code. ๏‚— Maintain and Monitor - Organizations' computing environments are dynamic and evolve over time, vulnerability management is an ongoing process rather than a point-in-time event. www.SecurityOrb.com
  • 28. Compliance 28 ๏‚— Regulatory Bodies www.SecurityOrb.com
  • 29. Other Things to Consider 29 ๏‚—Virtualization ๏‚—Cloud Computing ๏‚—Politics ๏‚—Reoccurring Scans ๏‚—Distributed Scanning ๏‚—Patch Management ๏‚—Penetration Testing www.SecurityOrb.com
  • 30. What Vulnerability Scanning Canโ€™t Do 30 ๏‚—Find Zero-Days and malware ๏‚—Eliminates the most obvious and known security threats. ๏‚—Canโ€™t Patch ๏‚—Determine the difference between False Positive/Negative www.SecurityOrb.com
  • 31. Conclusion ๏‚—The art of defending an organizational network takes many approaches to be done successfully. ๏‚—No one control can assure that the network is safe. Firewalls are great for prevention, IDS offer the ability for detection, Security Awareness briefing provides for user knowledge and Security Assessments assist with a proactive posture towards security. ๏‚—It also helps prove you've done "due diligence" in performing basic system patches and fixing the well- known problems in case a security breach causes financial, legal or regulatory problems.
  • 32. 32 Thank Youโ€ฆ @kellepc @securityorb www.SecurityOrb.com