Module 2 – PenTest Overview

Slides:



Advertisements
Similar presentations
FMS. 2 Fires Terrorism Internal Sabotage Natural Disasters System Failures Power Outages Pandemic Influenza COOP/ Disaster Recovery/ Emergency Preparedness.
Advertisements

PROJECT RISK MANAGEMENT
FDCC Implementation Efforts at Idaho National Laboratory Justin Hansen NLIT 2009.
Presented by Heorot.net.  Understand the need for a PenTest Methodology  Identify the most-used methodologies  Understand Advantages and Limitations.
NIH Security, FISMA and EPLC Lots of Updates! Where do we start? Kay Coupe NIH FISMA Program Coordinator Office of the Chief Information Officer Project.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
By: Ashwin Vignesh Madhu
IS&T Project Management: Project Management 101 June, 2006.
Vulnerability Assessment Course Terms, Methodology, Preparation, Obstacles, and Pitfalls.
IS&T Project Management: How to Engage the Customer September 27, 2005.
Project Management and Scheduling
Project Management Framework. PMBOK ® Guide, Third Edition.
Best Practices By Gabriel Rodriguez
The Business of Penetration Testing
BackTrack Penetration Testing Workshop Michael Holcomb, CISSP Upstate ISSA Chapter.
Project Management An Overview John Mulhall MIICM; LIB International Credit & Process Management Professional.
ISA–The Instrumentation, Systems, and Automation Society SP99 Work Group 2 TR#2 “Second Edition” Long Beach Meeting April 28, 2004.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
 A project is “a unique endeavor to produce a set of deliverables within clearly specified time, cost and quality constraints”
MethodGXP The Solution for the Confusion.
© VESP International Pty Limited To Contents Slide CLICK to advance slides/ bullet points within slides Integrated Master Planner An Overview.
Software Project Management
Management & Development of Complex Projects Course Code - 706
Module 14: Configuring Server Security Compliance
New Tools in an Old Company PMI Honolulu Chapter Meeting June 20, 2007.
7-Oct-15 System Auditing. AUDITING Auditing is a systematic process of objectively obtaining and evaluating evidence regarding assertions about economic.
How To Build a Testing Project 1 Onyx Gabriel Rodriguez.
BSBPMG406A Apply Communications Management Techniques Apply Communications Management Techniques Unit Guide C ertificate IV in Project Management
Module 8 – What's Next?  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.
BSBPMG405A Apply Human Resource Management Approaches Apply Human Resource Management Approaches Unit Guide C ertificate IV in Project Management
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
AREVA T&D Security Focus Group - 09/14/091 Security Focus Group A Vendor & Customer Collaboration EMS Users Conference September 14, 2009 Rich White AREVA.
10/20/ The ISMS Compliance in 2009 GRC-ISMS Module for ISO Certification.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Project Schedule PLAN IT!. Project Schedule Project Schedule is based on Work Breakdown Structure (WBS) Define the WBS correctly or the Project Schedule.
Cloud Compliance Considerations March 24, 2015 | Jason Smith, CISSP.
Module 3 – Information Gathering  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
Develop Project Charter
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Initiation and Planning for Success Sridhar Seshagiri Rao, PMP Innova Solutions Inc. Santa Clara, CA. April 9 th 2004.
Module 7 – Gaining Access & Privilege Escalation  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability.
Project Initiation at The Regence Group 12/19/2015John Garrigues1.
Module 5 – Vulnerability Identification  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification.
The Goal: To Climb Above The Competition Copyright 2005: I Lead Projects, L.L.C. Course Description Project Process Workplates Project Process Workplates.
Module 6 – Penetration  Phase II  Controls Assessment  Scheduling ○ Information Gathering ○ Network Mapping ○ Vulnerability Identification ○ Penetration.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Project Management Process
Internal Auditing ISO 9001:2015
What is project management?
P r o j e c t : from INITIATING to CLOSING ( 1 ).
Unit – I Presentation. Unit – 1 (Introduction to Software Project management) Definition:-  Software project management is the art and science of planning.
6/6/ SOFTWARE LIFE CYCLE OVERVIEW Professor Ron Kenett Tel Aviv University School of Engineering.
Board Assessment Governing Board Online Training Module.
Planning & Scheduling a Production Activity BRITA LYONS HEGARTY, MARKET KNOWHOW 16 TH NOVEMBER 2015 TRADEIT: SMART USE OF ITWORKSHOP.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Business Continuity Planning 101
Working Together Effectively. We will try to answer these questions for you today…  Why Am I Here?  Isn’t This Someone Else's Job?  What Am I supposed.
Certified Software Tester How To Build a Testing Project, Part 1.
Information Security Policy
Continuous Improvement Projects
Firewall Management Task Force
Project Implementation Plan
CDC Project Management Resources for EHDI Programs
Matthew Christian Dave Maddox Tim Toennies
CDC Project Management Resources for EHDI Programs
CDC Project Management Resources for EHDI Programs
ComplyCORE: Why didn’t I think of that?
Project Scope Management
Presentation transcript:

Module 2 – PenTest Overview Penetration Testing Methodologies Penetration Test Management (ISSAF)‏ PenTest Project Management Engineer Assessment Effort Heorot.net

Penetration Testing Methodologies ISSAF http://www.oissg.org/issaf OSSTMM http://www.isecom.org/osstmm/ NIST SP 800-42 http://csrc.nist.gov/publications/PubsSPs.html Heorot.net

Penetration Testing Methodologies ISSAF Peer-Reviewed Contains two separate documents Management (ISSAF0.2.1A)‏ Penetration Testing (ISSAF0.2.1B)‏ Checklists for Auditing / Hardening Systems Tool-Centric Heorot.net

Penetration Testing Methodologies ISSAF Advantages Does not assume previous knowledge Provides examples of pentest tool use “In the weeds” Disadvantages Out of date quickly Pentest tool examples are not extensive Last update: May 2006 Heorot.net

Penetration Testing Methodologies OSSTMM Peer-Reviewed Most popular methodology Assessments are discussed at a high-level Includes unique technology (RFID, Infrared)‏ Extensive templates Heorot.net

Penetration Testing Methodologies OSSTMM Advantages More flexibility for Pentesters Frequent updates Disadvantages Steeper learning curve Tool and OS knowledge necessary beforehand Latest version requires paid subscription Heorot.net

Penetration Testing Methodologies NIST SP 800-42 Federal Publication Least comprehensive methodology Tools-oriented NIST publications rarely get updated If you can't use anything else, at least use something Heorot.net

Penetration Test Management ISSAF Phase I – Planning Phase II – Assessment Phase III – Treatment Phase IV – Accreditation Phase V – Maintenance Use a Project Manager Heorot.net

PenTest Project Management Phase I – Planning Information Gathering Project Chartering Resource Identification Budgeting Bidding & Estimating (Called “Cash Flow”)‏ Work Breakdown Structure (WBS)‏ Project Kick-Off Heorot.net

PenTest Project Management Phase II – Assessment Inherent Risk Assessment Controls Assessment Legal & Regulatory Compliance Information Security Policy Information Security Organization and Mgmt. Enterprise Information Systems Security and Controls  (Penetration Testing)‏ Security Operations Management Business Continuity Management Heorot.net

PenTest Project Management Phase III – Treatment See Risk Treatment Plan Phase IV – Accreditation Context Establishment Evaluation Reporting Certification Phase V – Maintenance Heorot.net

PenTest Project Management Phase II – Assessment Inherent Risk Assessment Controls Assessment Legal & Regulatory Compliance Information Security Policy ...etc. Each assessment is broken down further... Heorot.net

PenTest Project Management Phase II – Assessment Project Management Documents Engagement Scope Communications Plan Issue Escalation Plan Scheduling Responsibility Matrix Deliverables Heorot.net

Engineer Assessment Effort Phase II – Assessment Scheduling (Engineering Effort)‏ Information Gathering Network Mapping Vulnerability Identification Penetration Gaining Access & Privilege Escalation Enumerating Further Compromise Remote Users/Sites Maintaining Access Cover the Tracks Heorot.net

Module 2 – Conclusion Penetration Testing Methodologies Penetration Test Management (ISSAF)‏ PenTest Project Management Engineer Assessment Effort Heorot.net