cover page - rice consulting security test plan.doc  · web view2 servers (one running hp-ux and...

22
Sample Security Test Plan - XYZ Remote Office Payroll System Sample Security Test Plan for XYZ Remote Office Payroll System Version 1.0 March 13, 2002 Page 1 of 17 3/1/2003 09:25:00 PM

Upload: others

Post on 15-Mar-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

Sample Security Test Plan

for

XYZ Remote Office Payroll SystemVersion 1.0

March 13, 2002

Page 1 of 17 3/2/2003 04:25:00 AM

Page 2: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

Sample Security Test Plan

ApprovalsTable of Contents

1. INTRODUCTION.......................................................................................................................... 4

1.1 TEST OBJECTIVES........................................................................................................................... 41.2 SCOPE OF TESTING......................................................................................................................... 41.3 SYSTEM OVERVIEW.........................................................................................................................51.4 DEFINITIONS/ACRONYMS..................................................................................................................5

1.4.1 Definitions.............................................................................................................................. 51.4.2 Acronyms.............................................................................................................................. 6

1.5 REFERENCES................................................................................................................................. 6

2. APPROACH................................................................................................................................. 62.1 ASSUMPTIONS/CONSTRAINTS...........................................................................................................6

2.1.1 Assumptions..........................................................................................................................62.1.2 Constraints............................................................................................................................ 6

2.2 COVERAGE..................................................................................................................................... 62.2.1 Software Components............................................................................................................72.2.2 Hardware Components..........................................................................................................72.2.3 Operating Systems................................................................................................................72.2.4 Requirements........................................................................................................................72.2.5 Business Processes...............................................................................................................7

2.3 TEST TOOLS................................................................................................................................... 72.4 TEST TYPE (REGRESSION, CONVERSION, ETC.).................................................................................72.5 TEST DATA..................................................................................................................................... 8

3. PLAN........................................................................................................................................... 83.1 TEST TEAM.................................................................................................................................... 83.2 TEAM REVIEWS............................................................................................................................... 93.3 MAJOR TASKS AND DELIVERABLES...................................................................................................93.4 ENVIRONMENTAL NEEDS.................................................................................................................. 9

3.4.1 Test Environment...................................................................................................................93.4.2 Test Lab............................................................................................................................... 10

3.5 TRAINING..................................................................................................................................... 11

4. FEATURES TO BE TESTED......................................................................................................114.1 APPLICATION FUNCTIONS...............................................................................................................11

4.1.1 Table Maintenance...............................................................................................................114.1.2 Create Timesheets...............................................................................................................114.1.3 Employee Time Entry...........................................................................................................114.1.4 Create Paychecks................................................................................................................114.1.5 Direct Deposit...................................................................................................................... 114.1.6 Submit Payroll Withholding Reports to IRS...........................................................................114.1.7 Network Security.................................................................................................................. 124.1.8 Dial-up Security.................................................................................................................... 124.1.9 Hardware Security...............................................................................................................124.1.10 Operating System Security...................................................................................................124.1.11 Data Recovery..................................................................................................................... 12

5. TESTING PROCEDURES..........................................................................................................125.1 TEST EXECUTION.......................................................................................................................... 12

5.1.1 Test Cases........................................................................................................................... 12

Page 2 of 17 3/2/2003 04:25:00 AM

Page 3: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

5.1.2 Order of Testing................................................................................................................... 125.2 PASS/FAIL CRITERIA...................................................................................................................... 135.3 SUSPENSION CRITERIA AND RESUMPTION REQUIREMENTS................................................................13

5.3.1 Normal Criteria..................................................................................................................... 135.3.2 Abnormal Criteria................................................................................................................. 13

5.4 DEFECT MANAGEMENT.................................................................................................................. 14

6. RISKS AND CONTINGENCIES..................................................................................................14

7. APPENDIX................................................................................................................................. 147.1 Appendix A: Work Breakdown Structure.....................................................................................14

Page 3 of 17 3/2/2003 04:25:00 AM

Page 4: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

1. Introduction

1.1 Test Objectives

The security test of the XYZ system should validate from both the requirements perspective and business perspective that:

All payroll business processes are secure.Direct deposit transactions are processed securely. Timekeeping functions are securely initiated and processed.Payroll security policies and procedures are supported by the system.Financial controls are adequate to prevent fraudulent transactions.Security controls are in place to prevent unauthorized system access.All points of security within the system work as defined in requirements.Recovery procedures are correct and can be performed by users. The system is adequately protected from external intrusion from dial-up and network

sources. The information stored in the system is adequately protected by access restriction and

encryption. Passwords are securely administered and maintained. Vendor products used in association with this system have been assessed and protected

in terms of security issues. In the event of data destruction or corruption, the data can be restored to a checkpoint no

later than the last two hours. The system complies with all government privacy requirements.

The objective of security testing is to:

Validate that existing security measures are in place and working effectively Identify areas where additional security measures need to be applied Review existing security policies and procedures to verify their adequacy and compliance.

1.2 Scope of Testing

The security test of the XYZ system will include payroll, accounting, and timekeeping applications. In addition, the interfaces to remote offices, financial institutions and the Internal Revenue Service will be tested.

The following aspects of security testing will be performed:

Penetration testing Denial of service detection (internal and external attacks) Fail-over contingencies for denial of service attacks Network intrusion detection Password auditing Desktop computer audits Compliance levels for security policies and procedures Transaction security (SSL, VPN, digital certificates) Data recovery testing Incident response testing Internal control adequacy Privacy testing Virus detection testing

Page 4 of 17 3/2/2003 04:25:00 AM

Page 5: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

Dumpster diving tests Social engineering tests

The security test of the XYZ system will include:

SoftwarePayroll, accounting, and timekeeping applicationsInterfaces to remote officesInterface to the Internal Revenue ServiceRemote access applications (PC Anywhere, etc.)

HardwareServersClientsDesktop modemsHubsRoutersSwitches

Operating SystemWindows XPWindows 2000Windows NTHP-UXRed Hat Linux

Data StorageEmployee databasePayroll databaseAccounting database

User AdministrationLogonsAuthorization Levels

1.3 System Overview

The XYZ system is a company-wide application that accepts personnel and payroll information from each of the company’s 50 remote offices across the U.S., processes payroll and produces

Page 5 of 17 3/2/2003 04:25:00 AM

RemoteOffices

PayrollApplications

TimekeepingApplications

IRS Reports

AccountingApplications

Bank

Page 6: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

payroll reports. The XYZ system will be networked to each of the remote offices and will link to the Internal Revenue Service by the Internet to transmit payroll tax deposits and tax reports. Payroll will be directly deposited to employee bank accounts.

1.4 Definitions/Acronyms

1.4.1 Definitions

Build A functionally independent piece of software that supports a well-defined logical subset of a system. A build can be tested independently and then integrated with other builds. Builds can be migrated from one level of testing to another and possibly installed independently of the rest of the system.

Critical Processing Unit

A program, module or unit that is critical to the correct functioning of the system. A critical processing unit carries with it a high impact of failure.

Model Office A validation of the implementation, operation and training of the system in a simulated office environment.

Prototype A working model of the software to be built. Demonstrates look and feel of the software, but does not support all features and functions.

Regression Testing Testing to ensure that unchanged parts of the software work the same as before a change was made.

Requirement Something that the system should do or be. May be based on user, business, or technical needs.

Static Test A verification performed without execution on a computer. For example, reviewing a document for accuracy.

Security Testing Testing that ensures the system will work securely in the real world to meet the business and/or operational needs of the people using the system, based on a pre-defined set of security criteria.

Test Tool Any vehicle that assists in testing.Trojan Horse A malicious software routine that is contained in another software product for

the purpose of being installed by an unsuspecting and trusting user.Vulnerability Scanner A tool which scans a firewall or network to identify know types of

vulnerabilities.

1.4.2 Acronyms

CVE A list of standardized names for vulnerabilities and other information security exposures — CVE aims to standardize the names for all publicly known vulnerabilities and security exposures. A listing can be found at http://www.cve.mitre.org/

DoS Attack Denial of Service attack. This involves flooding a system with excessive traffic as to prevent the system from servicing normal users. These attacks can be performed both internal and external to the organization.

Ddos Attack Distributed Denial of Service attack. A variation of the DoS attack that uses multiple distributed computers to launch and sustain the attack.

Page 6 of 17 3/2/2003 04:25:00 AM

Page 7: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

IRS Internal Revenue ServiceSSN Social Security Number

1.5 References

Security Requirements Specification Document for the XYZ SystemSecurity Test StandardsSecurity Test ProceduresSecurity Test Plan Notebook Project Test Plan NotebookPayroll Policy and Procedures Notebook Security Policies and Protocols Security Incident Response Plan

2. Approach

2.1 Assumptions/Constraints

2.1.1 Assumptions

The first build of the XYZ system will be ready for security testing on July 1, XXXX. Each build of the XYZ system will have passed functional unit and unit-to-unit testing

before it is transferred to the security testing environment. The security administration department will be involved in the planning and performance

of the security test.

2.1.2 Constraints

Two weeks might not be enough time to security test the entire system and then retest the system to find new defects due to fixes.

2.2 Coverage

Test coverage will be measured by:

A completed matrix of testable security requirements and security test cases.

A completed matrix of business processes and business security test cases.

In the event that coverage levels are not met, the QA manager and Information Security Manager will determine if the actual levels are adequate in light of the system risks.

2.2.1 Software Components

All user access points in the payroll, timekeeping, and accounting sub-systems will be tested.

All user desktop computers will be audited for: Unauthorized software Remote access software will be tested for secure password configuration. Current anti-virus software updated with the past week of testing Correctly configured desktop firewall

Page 7 of 17 3/2/2003 04:25:00 AM

Page 8: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

Desktop modems Adequate password protection

Web-based application interfaces will be tested for: Password protection Transaction security (SSL) Secure storage of data Buffer overflow prevention Type-safe data fields and strong edits Dynamic session Ids

Data interfaces will be tested for external transaction security (SSL)

2.2.2 Hardware Components

Servers – Hubs and Switches – Dial-up Modems – strong passwords established and changed on a monthly basis Desktop computers – audited for unauthorized components Networks – tested for vulnerabilities Printers – for payroll check printing

2.2.3 Operating Systems

Open and unused ports Unused services Password protection – defaults not used, guest accounts deleted Excessive privileges not granted

2.2.4 Requirements

All security requirements as specified in the Requirements Specification Document will be tested.

2.2.5 Business Processes

All critical business processes will be tested for security. Critical business processes are:

Employee Time EntryPayroll Tax CalculationCreate PaychecksDirect DepositSubmit Payroll Withholding Reports to the IRS.

2.3 Test Tools

Capture/Playback Load and Stress Password Auditing and Cracking Vulnerability Scanner Network Scanner Memory Test Tool Virus and Trojan Scanning Test ManagerDefect Tracker

Page 8 of 17 3/2/2003 04:25:00 AM

Page 9: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

2.4 Test Type (Regression, Conversion, etc.)

The following types of testing will be performed during security testing:

Functional testing, by performing security test cases based on testable security requirements

Functional testing, by performing security test cases based on real-world security scenarios and business functions

Compliance testing, by evaluating system performance against company security policies and procedures

Penetration testing, by testing each security access level, running vulnerability canners to identify network vulnerabilities and desktop vulnerabilities

Desktop computer audits to identify virus scanning currency, password strength, modem and network protection, and the presence of unauthorized software.

Controls testing, by testing all financial transaction controls Transaction security testing by validating encryption protocols are correctly applied and

used for all secure transaction processing Regression testing, to ensure that a change to the system does not introduce new

security defects. Data recovery testing, to ensure data can be restored in the event of data deletion or

corruption. Incident response testing to validate people respond in a correct and timely way to

security incidents. Internal control adequacy to ensure adequate measures are used to perform business

tasks securely. Privacy testing to ensure business partners and employees are not releasing private

corporate information outside the company. Virus detection testing to ensure that users are following virus prevention policies and

that desktop virus detection is current and working. Dumpster diving tests to ensure information discarded by employees is destroyed to

prevent people from retrieving it from outside trash bins and other sources. Social engineering tests to ensure people are following security procedures in the

information they provide to anyone – other employees (even managers), business partners and outsiders.

2.5 Test Data

To perform security testing, test data will be supplied from two sources:

Data created specifically for the security test and Data obtained from past payroll periods.

The order of test execution allows for test data to be created before it is needed in payroll processing and payroll reporting.

The following test data sources will be located on the central server in the test environment:

Employee data table (EMPLOYEE) - converted from existing sequential files and supplemented with specific test data that will execute test cases.

Employee time data (EMPTIME) - entered during the test and converted from existing sequential files

Tax table for current year and next year (TAXTABLE) - obtained in electronic format from the IRS.

Page 9 of 17 3/2/2003 04:25:00 AM

Page 10: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

3. Plan

3.1 Test Team

The following people will be on the security test team:

Name Title Level of involvement ResponsibilitiesJoe Johnson Team Leader -

Independent Test Team

40 hrs/wk Lead all testing activities, including test planning, test execution, and status reporting.

Mary Anderson

Assistant Team Leader - Independent Test Team

40 hrs/wk Fill in during any absence of team leader. Design and execute test cases, create test data, write test summary report

Pete Wilson End user - Payroll Dept.

25 hrs/wk Design and execute test cases for secure payroll processing.

Tom Jones End user - Internal Audit Dept.

40 hrs/wk Design and execute test cases to validate financial controls

Jane Peterson

End user - Personnel Dept.

30 hrs/wk Design and execute test cases, build employee test tables

Doug Thompson

Independent Tester

40 hrs/wk Design and execute security test cases for time reporting.

Dot Wong Independent Tester

40 hrs/wk Design and execute security test cases for payroll direct deposit.

Renee Roberts

Independent Tester

40 hrs/wk Design test cases for payroll reporting to IRS and financial sub-system.

Bobby Whitehat

Penetration Tester 40 Hrs/wk Design and perform penetration tests for all sub-systems, networks and hardware.

Mary Jane Goodhacker

Social Engineering Tester

20 hrs/ wk. Design and conduct test scenarios to obtain private information from employees.

Jackie Young Privacy Tester – Corporate Security

20 hrs/wk Design and conduct test scenarios to validate private company information is not being released by employees and business partners.

Mark Wright IT auditing 40 hrs/wk Assess compliance to existing security policies and procedures, including incident response, password creation and updating, and desktop computer policies.

Louise Johnson

Information Security Technician

30 hrs/wk Establish and maintain security test environment.

Kari Olson Desktop support 40 hrs/wk Audit and validate desktop computer use and compliance to security policies.

Gary Moore Security administrator

20 hrs/wk Technical assistance as needed during the test

Page 10 of 17 3/2/2003 04:25:00 AM

Page 11: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

Name Title Level of involvement ResponsibilitiesJohnny Young

Network administrator

20 hrs/wk Technical assistance as needed during the test

3.2 Team Reviews

The following reviews will be conducted by the entire test team, the network administrator, security administrator, and a representative from the QA department. Refer to the work schedule for the planned review dates.

Test plan reviewTest case reviewTest progress reviewPost-test review

3.3 Major Tasks and Deliverables

Milestone Start Stop Deliverable(s)Security test case design 5/1/XXXX 6/1/XXXX Security test casesBuild security test environment 5/15/XXXX 6/15/XXXX Test environment ready for test

data populationBuild security test data 6/2/XXXX 6/15/XXXX Employee data table, Employee

time data, Tax table for current year and next year.

Security test training 6/15/XXXX 6/17/XXXX Trained security testersSystem delivered for security testing

6/29/XXXX XYZ system ready for security testing.

Security test execution 7/1/XXXX 7/30/XXXX XYZ system security testedSecurity test summary report due

8/5/XXXX Security test summary report

3.4 Environmental Needs

3.4.1 Test Environment

HardwareAll test cases will be executed on the Development Server in the QA database environment.

One (1) networked HP Laser Jet 4100SE printer.- with 16 MB internal memory card- NIC

One (1) Compaq ProLiant Server with:- Intel Pentium 4 2.26 Ghz Processor- 120 GB SCSI Hard Drive- IDE & SCSI backup- Windows 2000 Server OS- 17” Monitor- APC Smart-UPS 600- APC PC-6 Outlet Surge Protector

Page 11 of 17 3/2/2003 04:25:00 AM

Page 12: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

One (1) HP rp2430 Server with:- PA-8700 Processor- 120 GB SCSI Hard Drive- IDE & SCSI backup- HP-UX OS- 17” Monitor- APC Smart-UPS 600- APC PC-6 Outlet Surge Protector

Two (2) HP Pavilion 754n PCs with:- Intel® Pentium®  4 2.53 GHz processor - 512 MB RAM- 80 GB Hard Drive- 17” Monitor- Windows XP Professional OS

Two (2) HP Pavilion 754n PCs with:- Intel® Pentium®  4 2.53 GHz processor - 512 MB RAM- 80 GB Hard Drive- 17” Monitor- Windows 2000 Professional OS

Two (2) HP Pavilion 754n PCs with:- Intel® Pentium®  4 2.53 GHz processor - 512 MB RAM- 80 GB Hard Drive- 17” Monitor- Linux OS

Network

LAN- Ethernet- Physically isolated from any other networks- Linksys 12 port switch- Category 5 cables to meet 10Base-T specifications

Software

XYZ application software

Server- GreenTree Accounting version 3.0- MS Windows 2000 Server operating system Workstation- MS Windows 2000 Professional operating system- MS Office 2002 (Word, Access, Excel, PowerPoint

- MS Internet Explorer Version 5.5- Netscape Communicator Browser v6

Test Tools- Web Application Stress Tool (WAS) – Microsoft free tool- Password Cracker and Audit Tool – LC4 (@Stake)- Application Vulnerability Scanner and Capture/playback – AppScan (Sanctum)

- SQL Injection

Page 12 of 17 3/2/2003 04:25:00 AM

Page 13: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

- Hidden Field Manipulation - Parameter Tampering - Stealth Commanding - Forceful Browsing - Backdoors and Debug Options - Cookie Poisoning - 3rd Party Misconfigurations - Cross-Site Scripting - Buffer Overflow - HTTP Attacks - Known Vulnerabilities (associated with CVEs) - Suspicious content

- Network Vulnerability Scanner – Saint (Saint)- Defect Tracking - PVCS Tracker (Merant)- Virus and Trojan Scanning – Norton AntiVirus (Symantec)- Test Manager – Test Director (Mercury)

3.4.2 Test Lab

The following items will be needed full-time by the security test team:

Six (6) PCs (one for each tester) with connection to the server 2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch 1 router 1 HP Laser Jet network printer 1 telephone 1 whiteboard (large) with markers and erasers Clerical/organizational material - file cabinet, storage boxes, folders, notebooks, printer

cartridges

3.5 Training

Test team members who have not been trained in the testing process will be trained in security testing techniques by the QA staff. The training will be three days in length and will be conducted at the corporate training facility the dates of 6/15/XXXX - 6/17/XXXX.

4. Features to be Tested

4.1 Application Functions

4.1.1 Table Maintenance

Security (authorization levels for table maintenance) Security (authorization and access for system users) Add/Update user access levels Add/Update users and passwords

4.1.2 Create Timesheets

Logon procedures Logon passwords and user name entry

Page 13 of 17 3/2/2003 04:25:00 AM

Page 14: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

Authorization to prevent users from accessing other employees’ data

4.1.3 Employee Time Entry

Logon procedures Logon passwords and user name entry Authorization to prevent users from accessing other employees’ time data Controls to ensure time entered is reasonable and correct

4.1.4 Create Paychecks

Logon procedures Logon passwords and user name entry Authorization to prevent users from accessing

other employees’ payroll data Controls to ensure payroll entered is reasonable and correct Controls to ensure employees receiving pay are valid Financial controls – reconciliation, approvals Print security – paychecks, reports

4.1.5 Direct Deposit

Update employee direct deposit information Transmit transactions securely Reconcile transmission report Controls to ensure payroll entered is reasonable and correct Controls to ensure employees receiving pay are valid Financial controls – reconciliation, approvals Print and report security

4.1.6 Submit Payroll Withholding Reports to IRS

Transmit payroll reports securely to the IRS Transmit weekly payroll tax deposit securely to IRS

4.1.7 Network Security

Network vulnerabilities tested and identified Application security holes that impact network access tested and identified Identification of:

Unused services Unused ports Default passwords in use

4.1.8 Dial-up Security

Dial-up vulnerabilities tested and identified Application security holes that impact dial-up access tested and identified Desktop modem audits – passwords, secure usage of modems Remote access security

4.1.9 Hardware Security

Desktop modems identified and password protected

Page 14 of 17 3/2/2003 04:25:00 AM

Page 15: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

4.1.10 Operating System Security

Operating system security vulnerabilities identified

4.1.11 Data Recovery

Recovery from remote transmission errors Recovery from interruptions in batch processing Recovery from interruptions in online processing Recovery from General Protection Faults (GPFs) Recovery from data corruption

Application security on all applications:

SQL Injection Hidden Field Manipulation Parameter Tampering Stealth Commanding Forceful Browsing Backdoors and Debug Options Cookie Poisoning 3rd Party Misconfigurations Cross-Site Scripting Buffer Overflow HTTP Attacks Known Vulnerabilities (associated with CVEs) Suspicious content

5. Testing Procedures

5.1 Test Execution

5.1.1 Test Cases

For each requirement, business process, or system feature to be tested, the tester will execute a set of pre-defined security test cases. Each test case will have a series of actions and expected results. As each action is performed, the results are evaluated. If the observed results are equal to the expected results, a checkmark is placed in the “pass” column. If the observed results are not equal to the expected results, a checkmark is placed in the “fail” column.

5.1.2 Order of Testing

1. Create Timesheets2. Network Vulnerability Testing3. Hardware Security Testing4. Operating System Security Testing5. Employee Time Entry Test6. Application Vulnerability Test7. Dial-up Security Test8. Data Recovery Test9. Process Payroll

Page 15 of 17 3/2/2003 04:25:00 AM

Page 16: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

a. Create Paychecks security testb. Direct Deposit transmission test

10. Payroll Reporting a. IRS Reportsb. Corporate Reports

5.2 Pass/Fail Criteria

To pass the security test, the following criteria must be met:

All payroll business processes are secure.Direct deposit transactions are processed securely. Timekeeping functions are securely initiated and processed.Payroll policies and procedures are supported by the system.Financial controls are adequate to prevent fraudulent transactions.Security controls are in place to prevent unauthorized system access.All points of security within the system work as defined in requirements.Recovery procedures are correct and can be performed by users. The system is adequately protected from external intrusion from dial-up and network

sources. The information stored in the system is adequately protected by access restriction and

encryption. Passwords are securely administered and maintained. Vendor products used in association with this system have been assessed and protected

in terms of security issues. In the event of data destruction or corruption, the data can be restored to a checkpoint no

later than the last two hours. The system complies with all government privacy requirements.

5.3 Suspension Criteria and Resumption Requirements

5.3.1 Normal Criteria

At the end of each day (5:00 p.m.) testing will be suspended. At that time, all test cases executed during the day should be marked as such. The security test team will initiate a backup routine to save the day’s updated test files.

When all test cases have been executed, the test will be suspended and the results documented for the Security Test Summary Report.

5.3.2 Abnormal Criteria

As a general guideline, if the defect backlog continually increases over a two week period, testing should be suspended. This will allow the developers time to fix existing defects without the pressure and confusion of new defects being added to the backlog. When a change is being migrated to the test environment, the security test team leader must be notified in advance to schedule a time for the move. After the move has been completed, a retest of previously tested functions should be performed.

If a critical processing unit is found to have severe defects (as defined by the defect reporting process), testing should be suspended until the defects have been fixed. When the fixed unit is

Page 16 of 17 3/2/2003 04:25:00 AM

Page 17: Cover Page - Rice Consulting Security Test Plan.doc  · Web view2 servers (one running HP-UX and the other running Windows 2000 Server) 1 12 port switch. 1 router. 1 HP Laser Jet

Sample Security Test Plan - XYZ Remote Office Payroll System

moved back into the test environment, any previously performed tests that affect the unit should be performed again to ensure new defects were not created as a result of the fix.

5.4 Defect Management

It is the intention of the System Engineering Test team to use PVCS Tracker for reporting, maintaining, tracking and overall management of the defects on the XYZ Payroll System. Change management procedures have been developed and have been described in the Project Test Plan.

The assignment and description of defect severity levels will be as follows:

1 - Critical Business objectives or completion of test case are impacted.2 - High Defects which prove to be detrimental to the system. Testing should not progress

to the next build until corrective measures have been taken.3 - Medium Defects which provide invalid/incorrect information. An example of a priority 3

defect could be a miscalculation of overtime pay, or a numeric entry is allowed in an alpha only field - which corrupts other database information.

4 - Low Defects are esthetic in nature. An example of a priority 4 defect could be the misplacement of an entry button on the left side of the screen when the user requirements stated it should be on the right side of the screen. Functionality is NOT impacted.

5 - Info An item observed during testing that may require further information. This type of priority could be assigned to a work order for an item encountered that is not clear in the requirements.

6. Risks and Contingencies

This section describes the system or project risks and the contingency plans that should take effect if the project experiences problems.

Timesheet Creation - Risk level low to moderate. Without adequate security, a user could corrupt timesheets that are printed.

Employee Time Entry - Risk level moderate to high. Without adequate security, a user could fraudulently report incorrect hours worked or could modify the hours worked by other employees.

Payroll Processing - Risk level moderate to high. Without adequate security, a user could fraudulently view or modify payroll information. Direct deposit transaction security is especially important to perform securely, as intercepted or misdirected transactions could be stolen by an attacker.

Payroll Reporting - Risk level moderate to high. Without adequate security, a user could fraudulently view or modify payroll reports.

7. Appendix

7.1 Appendix A: Work Breakdown Structure

Page 17 of 17 3/2/2003 04:25:00 AM