Security Assessment Priciples
Security Assessment Priciples
Assessment
Principles
Agenda
Human awareness
Policy factors
Hardware or software misconfigurations
Poor assumptions
Ignorance
Failure to stay up-to-date
Understanding Defense-in-Depth
Using a layered approach:
Increases an attacker’s risk of detection
Reduces an attacker’s chance of success
Application hardening
Components Example
Project goal
All computers running Windows 2000 Server and Windows Server 2003 on the subnets
192.168.0.0/24 and 192.168.1.0/24 will be scanned for the following vulnerabilities and will
be remediated as stated
Vulnerability Remediation
RPC-over-DCOM vulnerability Install Microsoft security updates
(MS 03-026) 03-026 and 03-39
Greater than 10 accounts in the local Minimize the number of accounts on the
administrator group administrators group
Types of Security Assessments
Vulnerability scanning:
Focuses on known weaknesses
Can be automated
Does not necessarily require expertise
Penetration testing:
Focuses on known and unknown weaknesses
Requires highly skilled testers
Carries tremendous legal burden in certain countries/organizations
IT security auditing:
Focuses on security policies and procedures
Used to provide evidence for industry regulations
Using Vulnerability Scanning to
Assess Network Security
7 Make recommendations
Understanding Components of a Security Audit
Implementation
Implementation
Technology
Technology
Process
Process Start with policy
Build process
Policy
Policy Apply technology
Reporting Security Assessment Findings
Information reconnaissance
Port scanning
Obtaining host information using
fingerprinting techniques
Network and host discovery
Information Reconnaissance
Techniques
Common types of information sought by attackers include:
System configuration
Valid user accounts
Contact information
Extranet and remote access servers
Business partners and recent acquisitions or mergers
Buffer overruns:
Write applications in managed code
To reduce the threat of network sniffing attacks on your network consider the
following:
Target LON-SRV1.nwtraders.msft
Buffer overflow
Assess for the
SQL injection
following
Guest account enabled
vulnerabilities
RPC-over-DCOM vulnerability
Defining the Security Assessment Goals
Project goal
LON-SRV1 will be scanned for the following vulnerabilities and
will be remediated as stated
Vulnerability Remediation
Require developers to fix Web-
SQL Injection
based applications
Have developers fix
Buffer Overflow
applications as required
Guest account enabled Disable guest account
RPC-over-DCOM Install Microsoft security
vulnerability update MS04-012
Choosing Tools for the Security Assessment
The tools that will be used for the Northwind Traders security
assessment include the following:
www.microsoft.se/technet
www.microsoft.se/security
www.truesec.se/events
www.itproffs.se