440 likes | 898 Views
Network Penetration Testing. Jack Jones, CISSP, CISA Director of Information Security Nationwide. Purpose. The Network Penetration Test What it is... What it isn’t… What it should be... How to get the most from it. Agenda. Defining the Penetration Test Attack Profiles
E N D
Network Penetration Testing Jack Jones, CISSP, CISA Director of Information Security Nationwide
Purpose • The Network Penetration Test • What it is... • What it isn’t… • What it should be... • How to get the most from it...
Agenda • Defining the Penetration Test • Attack Profiles • Engagement Approach • Vendor Selection • Rules of Engagement • Reporting • Making Use of the Results
Defining the Test • Three Primary Purposes... • “Punching a Ticket” • Proving a Point • Testing
Defining the Test • Understand the Limitations • Point-in-time snapshot • Can NEVER be considered 100% comprehensive • Constrained by time and resources
Defining the Test • Setting Test Goals • Audit versus validation • What constitutes success/failure? • Breach the perimeter? • Gain control? • Access critical or sensitive data? • All of the above (a.k.a. unrestricted)? • Technical versus operational emphasis
Attack Profiles • External Testing • Internet • Dial-up • Other (e.g., via trusted networks...) • Internal Testing • Social Engineering • Denial of Service (DoS) • Applications?
Approach Overt versus Covert? Informed versus Blind? Pre-assessment versus Post-assessment?
Approach • Overt Advantage • Better coordination = less risk • Covert Advantages • More accurate results • Better test of personnel and procedure
Approach • Informed Advantages • Better use of engagement time/resources • More thorough results • Less risk • Levels the playing field... • Blind Advantages…
Approach • Pre-assessment Advantages • More realistic results • More effective for proving a point • Post-assessment Advantage • Better as a test/audit • More thorough
Vendor Selection Everybody seems to offer it. How to choose?
Vendor Selection • Keys to finding the right vendor… • Experience (who) • Methodology (how) • Rationale (why) • How much ($$$)
Vendor Selection • Experience • No ex-hackers…please • Professional organizations • Strong technical backgrounds • Certifications are a plus
Vendor Selection • Methodology • Engagement Approach • Attack Profiles • Tools (commercial versus proprietary) • Communication • Reporting
Vendor Selection • Rationale • Not all penetration tests are created equal... • Why THEIR methodology • Make them explain it to you
Rules of Engagement The First Rule of Medicine “Do No Harm”
Rules of Engagement • Lessen Risk of... • Accidental Denial of Service • Destruction of Data • Better results • Clearer Communications & Expectations • Greater Flexibility • Due Diligence!
Rules of Engagement • Critical Rules • Clearly defined goals • Scope • What is off-limits (systems, networks, data, activities) • Timing • Lines of communication • Issue resolution
Reporting What’s That Again?
Reporting • Reporting is key to realizing value • Reports Should NOT be... • Computer-generated boiler-plate
Reporting • Reports Should Have... • No false positives • Prioritized results • Separate executive and technical sections • Exposures described in terms of business risk! • Resolution resource requirements • Real-world recommendations
Using the Results Why Were We Doing This in the First Place?
Using the Results • Identify and Understand… • Were the goals met? • Is further assessment required? • What are the most severe exposures? • Resolution Efforts… • Prioritized from a cost/risk perspective • Sponsored by management • Implemented!