The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

COMPANY X TECHNICAL SECURITY TESTING PROCESS VERSION 1.0 – Confidential – 2009-08-07 Vulnerability Testing Process By Gregory Yhan CISSP, CISM

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by , 2016-02-24 22:39:02

Vulnerability Testing Process - InfoSecWriters.com

COMPANY X TECHNICAL SECURITY TESTING PROCESS VERSION 1.0 – Confidential – 2009-08-07 Vulnerability Testing Process By Gregory Yhan CISSP, CISM

Vulnerability Testing Process

By Gregory Yhan CISSP, CISM
eMail: [email protected]

COMPANY X TECHNICAL SECURITY TESTING PROCESS

VERSION 1.0 – Confidential – 2009-08-07

TABLE OF CONTENTS

Table of contents.............................................................................................................................................. 2

1. Network security testing .......................................................................................................................... 3
1.1 Purpose ............................................................................................................................................ 3

2. Roles and responsibilities........................................................................................................................ 4
2.1 I.T Manager ...................................................................................................................................... 4
2.2 Assessor........................................................................................................................................... 4
2.3 Information Security ......................................................................................................................... 4
2.4 System Administrators ..................................................................................................................... 4

3. Process.................................................................................................................................................... 5
3.1 Process Flow.................................................................................................................................... 5
3.2 Assessment Plan.............................................................................................................................. 6
3.3 Request ID activation ....................................................................................................................... 6
3.4 Review Results................................................................................................................................. 6

4. Schedule.................................................................................................................................................. 7
4.1 Schedule Requirements ................................................................................................................... 7

5. Assessment Plan Template..................................................................................................................... 8

COMPANY X TECHNICAL SECURITY TESTING PROCESS Page 2 of 8

VERSION 1.0 – Confidential – 2009-08-07

1. NETWORK SECURITY TESTING

1.1 Purpose

This document is a sample of a vulnerability testing process for a fictitious company, Company X. It
outlines Company X’s technical security testing process. The key deliverable is to take a risk base

approach to identifying and validating system vulnerabilities.

To successfully obtain this key objective, any vulnerability testing must follow a standardized
process methodology. The methodology must incorporate the following:

Adaptable: The Vulnerability Test Process is adaptable to various types of security testing,
including password cracking, network discovery and penetration testing.

Auditable: The Vulnerability Test Process is documented and has defined objectives.

Repeatable: The Vulnerability Test Process is repeatable to ensure consistency across all
vulnerability testing initiative.

COMPANY X TECHNICAL SECURITY TESTING PROCESS Page 3 of 8

VERSION 1.0 – Confidential – 2009-08-07

2. ROLES AND RESPONSIBILITIES

2.1 I.T Manager

1. Authorize all security assessment activities.
2. Review all vulnerability-scanning reports.
3. Assign roles and responsibilities for performing security assessments.
4. Assign roles and responsibilities for mitigating risks.

2.2 Assessor

1. Inform the appropriate parties—such as information security, management, system
administrators, and users—of security assessment activities.

2. Execute examinations and tests, and collecting all relevant data.
3. Conduct additional examinations and tests when needed to validate mitigation actions.
4. Collaborate with Information Security to develop an assessment plan for all vulnerability testing.
5. Keep a log that includes assessment system information.

2.3 Information Security

1. Analyze collected data and develop mitigation recommendations.
2. Develop an assessment plan for all vulnerability testing activity.
3. Determine system impact rating.
4. Develop an Assessment Plan for vulnerability testing.

2.4 System Administrators

1. Activate vulnerability scanning ID when vulnerability scans are scheduled.
2. Deactivate vulnerability scanning ID when a scheduled vulnerability scan is completed.
3. Fix vulnerabilities.

COMPANY X TECHNICAL SECURITY TESTING PROCESS Page 4 of 8

VERSION 1.0 – Confidential – 2009-08-07

3. PROCESS

3.1 Process FlowInformation
Security
Vulnerability Testing Process

Develop Assessment
Plan for each
assessment

Assessor Review Review Yes
Assessment Plan

I.T. Manager Plan Changes to
Review Assessment Plan

Information Security No

System Admin Request Activation
of Assessment ID
Assessor
with approval

Activate ID for 12
hrs.

Complete
Vulnerability

Scann

Information
Security
Review Results
Page 5 of 8
COMPANY X TECHNICAL SECURITY TESTING PROCESS

VERSION 1.0 – Confidential – 2009-08-07

3.2 Assessment Plan

The assessment plan will provide structure and accountability to the vulnerability-testing program. Information
Security function and the assessor will develop this plan for each vulnerability assessment test. This will be
apart of the vulnerability testing documentation. Sign-off from the I.T Manager will be required.

The assessment plan will answer these basic questions:
 What is the scope of the assessment?
 Who is authorized to conduct the assessment?
 What are the assessment’s logistics?
 How should sensitive data be handled?
 What should occur in the even of an incident plan?

3.3 Request ID activation

After sign-off of the Assessment Plan is received from the I.T. Manager, the information security function will
request the vulnerability testing ID be activated for a period of 12 hours. Following this timeframe, the ID
should be immediate deactivated.

3.4 Review Results

The Information Security function will review the results of any vulnerability testing. Results will be review with
the assistance from various SME’s. A recommendation regarding any vulnerabilities identified will be made to
the I.T Manager. Resources will be assigned by the I.T manager to address vulnerabilities.

3.5 Remediation

A remediation plan will be developed and implemented for each scanned results. The plan will outline roles,
responsibilities and deadlines for remediation. The I.T manager will assign the appropriate resources to
address any vulnerability recommended for remediation by I.T security. The following is a schedule for
remediating vulnerabilities base on impact and severity rating:

Remediation schedule: Low Severity Vulnerability Score High Severity
Priority Matrix Medium Severity

Impact Low Fix within One Year Fix within One Year Fix within Six Months

Medium Fix within One Year Fix within Six Months Fix within One Month

High Fix within Six Months Fix within One Month Fix within One Month

COMPANY X TECHNICAL SECURITY TESTING PROCESS Page 6 of 8

VERSION 1.0 – Confidential – 2009-08-07

4. SCHEDULE

4.1 Testing schedule

Vulnerability testing is scheduled base on system impact and vulnerability score. In this context, impact
means the overall affect on a Company X system, if such system was compromised. The vulnerability score is
the result of the last vulnerability test.

Examples of High impact systems include:

 Firewalls, routers, and perimeter defense systems such as for intrusion detection,
 Public access systems such as web and email servers,
 DNS and directory servers
 Database servers with confidential client data.

The following table outlines the timing for the next review. The timing of the next review is dependent upon
two things:

1. The criticality of the system.
2. The Vulnerability Severity rating

Impact Priority Matrix Low Severity Vulnerability Score High Severity
One Year Medium Severity Six Months
Low One Year One Month
Medium Six Months One Year One Month
Six Months
High One Month

COMPANY X TECHNICAL SECURITY TESTING PROCESS Page 7 of 8

VERSION 1.0 – Confidential – 2009-08-07

5. ASSESSMENT PLAN TEMP LATE

Assessment Overview:
What is the scope of the assessment?

Who is authorized to conduct the assessment?

Please list systems and networks authorized to be
examined (e.g. system name, IP addresses or address
ranges):

Assessment Type:
Please outline the type and level of testing being
performed (e.g. port and service identification,
vulnerability scanning):
Logistical Details:

Assessment schedule date:

Physical location where assessment activities will
originate:

Please list equipment and tools that will be used to
conduct the assessment:

Are there any requirements to inform parent organization?

Who is responsible for informing the parent organization?

Incident Handling:

Primary and alternate points of contact for the assessor:

Sign off: I.T. Manager

Nenad Vitas or Fernando Da Silva
________________________

Sergei Myrox ________________________ Assessor

Gregory Yhan ________________________ Information Security

COMPANY X TECHNICAL SECURITY TESTING PROCESS Page 8 of 8

VERSION 1.0 – Confidential – 2009-08-07


Click to View FlipBook Version