Download presentation
Presentation is loading. Please wait.
Published byAubrie Phelps Modified over 8 years ago
1
Risk Assessments in Many Flavors George J. Dolicker, CISA, CISSP
2
2 ©2005 George J. Dolicker. All Rights Reserved Agenda Fully Buzz-Word Compliant Key Factors to be Considered Hierarchical Investigations Standards, Regs, and Methodologies The IAM and IEM from NSA Conclusions Q&A
3
3 ©2005 George J. Dolicker. All Rights Reserved Fully Buzz-Word Compliant Security Assessment Security Audit Security Evaluation Risk Assessment Risk Analysis Vulnerability Analysis Vulnerability Assessment
4
4 ©2005 George J. Dolicker. All Rights Reserved Fully Buzz-Word Compliant Pen Test Red Team Tiger Team Ethical Hack White Hat Hack
5
5 ©2005 George J. Dolicker. All Rights Reserved Key Factors to be Considered What’s important to you What it’s worth to you Who your enemies are What it’s worth to them How secure you want to be How secure you need to be How to get there from where you are today
6
6 ©2005 George J. Dolicker. All Rights Reserved Hierarchical Investigations Level 1 –Cooperative High Level Overview –Information Criticality Analysis –Includes Policy, Procedures, & Information Flow –No Hands-on Testing
7
7 ©2005 George J. Dolicker. All Rights Reserved Hierarchical Investigations Level 2 –Hands-on process –Cooperative Testing –Diagnostic Tools –Penetration Tools –Specific Technical –Expertise
8
8 ©2005 George J. Dolicker. All Rights Reserved Hierarchical Investigations Level 3 –Adversarial –External Penetration Tests –Simulation of Anticipated Adversary –Good Place for Clear Rules of Engagement!
9
9 ©2005 George J. Dolicker. All Rights Reserved Why Some Don’t WANT to Know Ignorance remains a defense… »…but not a good one Blame Management »“How did you let it get this way?” Budget Constraints Turf Issues Span of Control
10
10 ©2005 George J. Dolicker. All Rights Reserved Standards, Regs, and Methodologies COBiT BS7799 ISO-17799
11
11 ©2005 George J. Dolicker. All Rights Reserved Standards, Regs, and Methodologies SOX HIPAA
12
12 ©2005 George J. Dolicker. All Rights Reserved Standards, Regs, and Methodologies X-Corp Security X-Ray NIST 800-30 NSA IAM NSA IEM
13
13 ©2005 George J. Dolicker. All Rights Reserved NIST 800-30 Step 1: System Characterization Step 2: Vulnerability Identification Step 3: Threat Identification Step 4: Control Analysis Step 5: Likelihood Determination
14
14 ©2005 George J. Dolicker. All Rights Reserved NIST 800-30 Step 6: Impact Analysis Step 7: Risk Determination Step 8: Control Recommendations Step 9: Results Documentation
15
15 ©2005 George J. Dolicker. All Rights Reserved
16
16 ©2005 George J. Dolicker. All Rights Reserved
17
17 ©2005 George J. Dolicker. All Rights Reserved The NSA Infosec Assessment Methodology Characteristics Pre-Assessment On-Site Activities Post-Assessment
18
18 ©2005 George J. Dolicker. All Rights Reserved Characteristics By request only Management Buy-in Success depends on cooperation of people Non-attribution Strong focus on policy, practice, process and procedure Findings protected as proprietary Timeliness
19
19 ©2005 George J. Dolicker. All Rights Reserved Phase 1: Pre-Assessment Purpose –Refine customer needs –Gain an understanding of the criticality of the customer’s systems and information –Identify systems, including system boundaries –Coordinate logistics with the customer –Write an assessment plan
20
20 ©2005 George J. Dolicker. All Rights Reserved The Assessment Plan 1.Points of Contact 2.Organization 3.Information Criticality 4.System Criticality 5.Concerns/Constraints
21
21 ©2005 George J. Dolicker. All Rights Reserved The Assessment Plan 6.System Configurations 7.Interviewees 8.Documents 9.Project Plan
22
22 ©2005 George J. Dolicker. All Rights Reserved Phase 2: On-Site Activities Purpose –To explore and confirm the information and conclusions made during the Pre-Assessment Phase –To perform data gathering and validation Interviews Documentation System demonstrations –To provide initial analysis and feedback to the customer
23
23 ©2005 George J. Dolicker. All Rights Reserved 18 Areas of Investigation 1. Documentation 2. Roles and Responsibilities 3. Contingency Planning 4. Configuration Management 5. Identification and Authentication 6. Account Management 7. Session Controls 8. Auditing 9. Malicious Code Protection 10. Maintenance 11. System Assurance 12. Networking/Connectivity 13. Communications Security 14. Media Controls 15. Labeling 16. Physical Environment 17. Personnel Security 18. Education Training and Awareness
24
24 ©2005 George J. Dolicker. All Rights Reserved Phase 3: Post-Assessment Purpose –Finalize analysis –Prepare and delivery of a final report
25
25 ©2005 George J. Dolicker. All Rights Reserved The Final Report Executive Summary –Overview of organization/mission –Purpose and methodology of assessment –System description/information criticality –Major findings and recommendations
26
26 ©2005 George J. Dolicker. All Rights Reserved The Final Report Introduction –Provides background information Overview of organization’s mission Purpose of the assessment Organizational mission information and information criticality System criticality Customer concerns
27
27 ©2005 George J. Dolicker. All Rights Reserved The Final Report System Descriptions –Description of the systems assessed Network components (e.g., firewalls, modems, routers, wireless) Connectivity Number/type of users Operational schedules –Diagrams
28
28 ©2005 George J. Dolicker. All Rights Reserved The Final Report Analysis –Topic areas –Findings –Discussions –Recommendations
29
29 ©2005 George J. Dolicker. All Rights Reserved The Final Report Conclusions –Overall posture description –Recognition of good security practices
30
30 ©2005 George J. Dolicker. All Rights Reserved The NSA Infosec Evaluation Methodology What is IEM? –Analysis of the network structure –Examination of the security configuration of the servers, workstations, and network devices for vulnerabilities and exposures –Provide recommendations for improvement of the network security –Provide an “easy to understand” view of technical security at the organization
31
31 ©2005 George J. Dolicker. All Rights Reserved IEM Characteristics Includes hands-on testing Intrusive, but with no exploitation Repeatable processes Findings are protected as proprietary Provides a technical security roadmap customized to the environment
32
32 ©2005 George J. Dolicker. All Rights Reserved IEM Phase 1: Pre-Evaluation –Pull information from IAM Pre-Assessment –Coordination with the customer to determine Rules of Engagement –Define customer expectations –Define customer constraints or concerns –Develop the Technical Evaluation Plan
33
33 ©2005 George J. Dolicker. All Rights Reserved IEM Phase 2: On-Site –Verification of “known” components –Discovery of rogue components –Testing –Validating findings via manual checks
34
34 ©2005 George J. Dolicker. All Rights Reserved 10 Baseline Activities 1.Port Scanning 2.SNMP Scanning 3.Enumeration & Banner Grabbing 4.Wireless Enumeration 5.Vulnerability Scanning 6.Host Evaluation 7.Network Device Analysis 8.Password Compliance Testing 9.Application Specific Scanning 10.Network Sniffing
35
35 ©2005 George J. Dolicker. All Rights Reserved IEM Phase 3: Post Evaluation –Create the final report for the customer Provide complete findings for the evaluation Provide recommendations and alternatives to resolve each solution Provide a security roadmap based on customer input and industry standards Follow up with customer to provide support for questions or concerns
36
36 ©2005 George J. Dolicker. All Rights Reserved Conclusions Don’t let the Buzz-Words throw you Know what you want to know Insist on actionable results
37
37 ©2005 George J. Dolicker. All Rights Reserved Questions? Don’t Forget the Evaluations! (Session 132)
38
38 ©2005 George J. Dolicker. All Rights Reserved Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.