3
3
Assessment and
Testing
Regular checks ensure adequate security controls are in place and
effective.
Security Tests
1 Automated Scans
Run regularly to check for vulnerabilities
2 Tool-Assisted Tests
Use specialized tools to probe security
3 Manual Attempts
Try to undermine security controls
Security Assessments
Risk Assessment Recommendations
Identify vulnerabilities that Suggest remediation steps
may allow compromise as needed
Management Report
Summarize results in non-technical language
Security Audits
Internal Audits External Audits Third-Party Audits
Performed by internal staff for Performed by outside firm for Conducted on behalf of another
internal use external validity organization
Vulnerability Assessments
1 Network Discovery 2 Network
Scans Vulnerability Scans
Identify systems and Probe for known
open ports vulnerabilities
Test from external attacker perspective Use system access to improve accuracy
Web Vulnerability
Scanning
1 SQL Injection 2 Cross-Site Scripting
Test for database query Check for malicious script
manipulation injection
3 Input Validation
Verify proper handling of user inputs
Database Vulnerability
Scanning
Validation
Confirm vulnerabilities are not false positives
Remediation
Apply patches or implement workarounds
Penetration Testing
1 Planning
Agree on scope and rules of engagement
2 Discovery
Gather information about target environment
3 Attack
Attempt to exploit vulnerabilities
4 Reporting
Summarize results and recommend improvements
Types of Penetration Tests
White-Box Gray-Box Black-Box
Testers given detailed system Testers given partial system Testers given no prior information
information knowledge
Penetration Testing Tools
Metasploit Framework
Automate common exploit techniques
Password Crackers
Attempt to break weak passwords
Breach and Attack
Simulations
Automated Testing Continuous
Assessment
Simulate attacks to test
security controls Regularly evaluate security
posture
Control Validation
Verify effectiveness of security measures
Compliance Checks
1 Regulatory 2 Industry Standards
Requirements
Ensure compliance with
Verify adherence to best practices
relevant laws
3 Internal Policies
Confirm alignment with company guidelines
Security Content Automation
Protocol (SCAP)
CVE
Common Vulnerabilities and Exposures naming system
CVSS
Common Vulnerability Scoring System
CCE
Common Configuration Enumeration
Service Organization
Controls (SOC) Audits
SOC 1 Financial reporting controls
Control Objectives for Information Information security management Code of practice for information
and Related Technologies system standard security controls
Penetration Testing
Methodologies
1 OWASP Testing 2 OSSTMM
Guide
Open Source Security
Web application security Testing Methodology
testing Manual
3 NIST 800-115
Technical Guide to Information Security Testing