16
Security Testing in an Age of Austerity Peter Wood Chief Executive Officer FirstBase Technologies An Ethical Hacker’s View

Security Testing in an Age of Austerity

Embed Size (px)

DESCRIPTION

How to conduct meaningful security testing with a reduced budget - an ethical hacker's view.

Citation preview

Page 1: Security Testing in an Age of Austerity

Security Testingin an Age of Austerity

Peter WoodChief Executive Officer

First•Base Technologies

An Ethical Hacker’s View

Page 2: Security Testing in an Age of Austerity

Slide 2 © First Base Technologies 2011

Who is Peter Wood?

Worked in computers & electronics since 1969

Founded First•Base in 1989 (one of the first ethical hacking firms)

CEO First Base Technologies LLPSocial engineer & penetration testerConference speaker and security ‘expert’Chair of Advisory Board at CSA UK & IrelandVice Chair of BCS Information Risk Management and Audit GroupDirector UK/Europe Global Institute for Cyber Security + ResearchMember of ISACA London Security Advisory GroupCorporate Executive Programme ExpertIISP Interviewer

FBCS, CITP, CISSP, MIEEE, M.Inst.ISPRegistered BCS Security ConsultantMember of ACM, ISACA, ISSA, Mensa

Page 3: Security Testing in an Age of Austerity

Slide 3 © First Base Technologies 2011

How do you decide what to test?

1. External infrastructure penetration tests2. Remote access tests3. External web application tests4. Internal network discovery and penetration

tests5. Internal Windows penetration tests6. Server security reviews7. Database and internal applications tests8. Wireless penetration tests9. Endpoint penetration tests10. Social engineering tests

Page 4: Security Testing in an Age of Austerity

Slide 4 © First Base Technologies 2011

Consider the Risks

Threat

Vulnerability

Impact

Page 5: Security Testing in an Age of Austerity

Slide 5 © First Base Technologies 2011

Risk Example

Hacktivist

Insecure web site

Reputational damage

Page 6: Security Testing in an Age of Austerity
Page 7: Security Testing in an Age of Austerity
Page 8: Security Testing in an Age of Austerity

Slide 8 © First Base Technologies 2011

Example threats

Page 9: Security Testing in an Age of Austerity

Slide 9 © First Base Technologies 2011

Example vulnerabilities

Page 10: Security Testing in an Age of Austerity

Slide 10 © First Base Technologies 2011

Example impacts

Page 11: Security Testing in an Age of Austerity

Slide 11 © First Base Technologies 2011

Preventative controls?

Page 12: Security Testing in an Age of Austerity

Slide 12 © First Base Technologies 2011

List threats and vulnerabilities

1. Inadequate logging and analysis2. Inadequate firewalling

2. Remote access1. Disaffected employees

1. Poor quality passwords2. Systems not patched up to date3. Inadequate logging and analysis

1. Windows privilege escalation

1. Disaffected employees

Vulnerability analysisThreat vector and scopeThreat source

Page 13: Security Testing in an Age of Austerity

Slide 13 © First Base Technologies 2011

Rate the impact of each event

1. Destruction of selected information (A3)

2. Corruption of selected information (I3)

3. Theft of selected information (C3)

1. Inadequate logging and analysis

2. Inadequate firewalling

2. Remote access

Disaffected employees

1. Widespread destruction of information (A5)

2. Widespread corruption of information (I5)

3. Theft of sensitive information (C5)

4. Fraud (I5)

1. Poor quality passwords

2. Systems not patched up to date

3. Inadequate logging and analysis

1. Windows privilege escalation

Disaffected employees

Impact analysisVulnerability analysis

Threat vector and

scope

Threat source

Page 14: Security Testing in an Age of Austerity

Slide 14 © First Base Technologies 2011

What to test?

• Threat analysis

- What are the real threats with high impact?

• Legal, policy and audit requirements

- What must we do to remain compliant?

• Incidents

- What has happened that worries us?

• Budgets

- How can we get the most from our budgets?

Page 15: Security Testing in an Age of Austerity

Slide 15 © First Base Technologies 2011

What to fix?

• Vulnerability analysis

- What are the real vulnerabilities with high impact?

• Legal, policy and audit requirements

- What must we do to remain compliant?

• Incidents

- What must we fix to prevent a recurrence?

• Budgets

- What can we afford to fix?

Page 16: Security Testing in an Age of Austerity

Slide 16 © First Base Technologies 2011

Peter WoodChief Executive Officer

First•Base Technologies LLP

[email protected]

Twitter: peterwoodx

Blog: fpws.blogspot.com

http://firstbase.co.ukhttp://white-hats.co.ukhttp://peterwood.com

Need more information?