breaking down the enterprise security assessment

20
Breaking Down the Enterprise Security Assessment Presented by: Michael R. Farnum, CISSP Senior Security Solutions Engineer

Upload: vianca

Post on 24-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

Breaking Down the Enterprise Security Assessment. Presented by: Michael R. Farnum, CISSP Senior Security Solutions Engineer. Purpose and Audience. SME and Enterprise Security Staff Risk in the assessment What am I missing? How far should I (or the assessor) go? Assessor / Consultant - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Breaking Down the Enterprise Security Assessment

Breaking Down the Enterprise Security Assessment

Presented by: Michael R. Farnum, CISSP

Senior Security Solutions Engineer

Page 2: Breaking Down the Enterprise Security Assessment

Purpose and Audience

SME and Enterprise Security Staff Risk in the assessment What am I missing? How far should I (or the assessor) go?

Assessor / Consultant Risk in the assessment What am I missing? How far should I go?

Page 3: Breaking Down the Enterprise Security Assessment

The Basic Premise

Many enterprise security assessments look at too few attack vectors or do not dig far enough into the attack vectors once a vulnerability has been discovered.

Page 4: Breaking Down the Enterprise Security Assessment

THE BIG MISTAKE

Security assessment = find the vulnerabilities and more of a holistic look at security.

Penetration test = a focused attack of a single or a few vulnerabilities that are generally already known to exist or are suspected of existing.

Pen Test ≠ Assessment

Page 5: Breaking Down the Enterprise Security Assessment

Religious Debate

How far do you dig? Will it break my stuff? Will I be responsible if you break my

stuff?

Page 6: Breaking Down the Enterprise Security Assessment

What about RISK?

Assessment vectors can (and probably should) be based on risk

But... DON’T ASSUME YOU KNOW YOUR RISK!

The Security “ASS”-umption

Page 7: Breaking Down the Enterprise Security Assessment

LET'S DIG INTO THE ASSESSMENT

Page 8: Breaking Down the Enterprise Security Assessment

External Assessment Information Gathering Vulnerability Identification Confirmation and Exploitation (”Pen Test”) Web applications

External Technical Testing

Page 9: Breaking Down the Enterprise Security Assessment

Wireless Testing IdentificationPenetration

War Dialing IdentificationPenetration

External Technical Testing

Page 10: Breaking Down the Enterprise Security Assessment

Vulnerability TestingWorkstations (sampling or images)Servers (maybe sampling)Network Devices

Configuration Review (criticals or sampling)

ServersWorkstationsNetwork Devices

Internal Technical Testing

Page 11: Breaking Down the Enterprise Security Assessment

Network Activity AnalysisThreat (malicious traffic)Traffic (policy compliance)

Applications

Internal Technical Testing

Page 12: Breaking Down the Enterprise Security Assessment

Policies and Standards Review Social Engineering

User environmentPhysical environment

Physical SecurityGap AnalysisPenetration Testing

Non-Technical Testing

Page 13: Breaking Down the Enterprise Security Assessment

Interviews for reviewsArchitecture reviewSecurity coverage reviewCompliance review

Non-Technical Testing

Page 14: Breaking Down the Enterprise Security Assessment

NEVER FORGET ABOUT THE DELIVERABLES

Page 15: Breaking Down the Enterprise Security Assessment

Deliverables

TangiblesDocumentation

Remediation helpStrategy documentAttestation

Raw data

Page 16: Breaking Down the Enterprise Security Assessment

IntangiblesKnowledge transferWorkshopsPresentations

Deliverables

Page 17: Breaking Down the Enterprise Security Assessment

AKA – Follow-Up TestingVery important, especially for compliance

Point in time security is NOT security

Develop a security program

Remediation Verification

Page 18: Breaking Down the Enterprise Security Assessment

Summary

Get the terms straightDon’t ignore risk, but don’t assume you know all your vectors

Deliverables (tangible and intangible) are important

Follow-up to verify remediation

Page 19: Breaking Down the Enterprise Security Assessment

Work Contact Info

Email – [email protected]

Phone – 832.971.4854http://www.accuvant.com

Page 20: Breaking Down the Enterprise Security Assessment

Other places you can find me

http://infosecplace.com/bloghttp://infosecplacepodcast.com

Twitter - @m1a1vet