24 Managing Network Vulnerability Assessment
industry may have one or two office locations where staff must be interviewed
but may also have a number of refinery and distribution plants where the
company feels there is not a strong need to interview staff. (We make no
comment here on whether that decision is right or wrong.) In another industry
— perhaps healthcare — the organization’s management may decide that staff
at each location must be interviewed. The healthcare organization may have
its headquarters in one city and hospitals and doctors’ offices in many cities
located many miles apart.
In each case, we will need to know how many offices are to be visited
and their location. We will document that in a table such as the one shown
in Exhibit 6.
If an organization — at the stage of the project when the scope is being
developed — cannot fully answer the questions needed to complete the above
tables (i.e., those in Exhibits 4 through 6), it is still necessary to enter some
values for each of the three areas discussed above. It is acceptable, instead
of entering specific values in each of the three tables above, to enter more
vague descriptions such as “Interview five key personnel to be named” or
“Spend ten hours collecting and reviewing documents” — as long as specific
values are substituted for these vague descriptions before project kickoff. If
the vague details turn out to be too small to accommodate the specific values
(for example, if eight specific individuals need to be interviewed instead of
just five), then a scope change must be initiated. Scope change is discussed
at the end of this chapter.
When these three tables are complete (even temporarily, with vague
descriptions), we have the scope of the top-down assessment and can move
on to developing the scope of the bottom-up assessment.
Scope of the Bottom-Up Assessment Tasks
As we will see later in the book, the bottom-up examination concentrates on
hardware and software implementations of network security by assessing the
network as a discrete entity and by assessing the security of individual
components.
Exhibit 6. Physical Location List
Location Description City/State
To Be Included in Interview Schedule?
YN
Project Scoping 25
To define the scope of the bottom-up assessment part of the overall network
vulnerability assessment, we need to understand what network components
will be involved in the test and what types of tests we are going to run. This
information can be broken into seven elements for the purpose of developing
the scope and, as with the tables in Exhibits 4, 5, and 6, combined to make
an attachment to the Project Scope Document. The seven elements in the
scope of a bottom-up assessment are:
1. Testing parameters
2. IP addresses
3. Configuration audit
4. Cryptographic analysis
5. Password cracking
6. Application examination
7. War dialing
For each of these seven elements, the information needed to define the scope
of the project can be gathered in a questionnaire. Exhibit 7 shows an example
of the questionnaire.
Exhibit 7. Bottom-Up Scope Questionnaire
Testing Parameters
The following are specific test parameters agreed upon by the assessment project manager and
(project sponsor):
Systems being tested are [production/development/both production and development] sys-
tems.
The test team [has/has not] been granted permission to install ESM agents for configuration
audits. Note: ESM is discussed in Chapter 6.
[The assessment project manager/client/both] will choose the devices for point scans.
[The assessment project manager/client/both] will choose the devices for configuration audits.
Client [has/has not] authorized the assessment project manager to perform denial-of-service
testing.
A physical security assessment [was/was not] requested.
Social engineering [was/was not] requested.
The assessment project manager [has/has not] been requested to evaluate the following, if
present:
The test team is restricted to after-hours testing as follows:
Light network scans [Yes/No] [Time range]
Heavy network scans [Yes/No] [Time range]
Point scan testing [Yes/No] [Time range]
Denial-of-service testing [Yes/No] [Time range]
Configuration audits [Yes/No] [Time range]
War dialing [Yes/No] [Time range]
The test team has been requested to follow additional guidelines while testing:
[Specify any additional guidelines]
26 Managing Network Vulnerability Assessment
Exhibit 7. Bottom-Up Scope Questionnaire (continued)
IP Addresses
List of IP addresses to be tested:
[List IP addresses and ranges to be tested]
Specific IP addresses targeted for point scans
Chosen by client:
[List IP addresses and ranges to be tested]
Chosen by the test team:
[List IP addresses and ranges to be tested]
Specific IP addresses to be used for the ESM (Enterprise Security Manager) configuration audit
Chosen by client:
[List IP addresses and ranges to be tested]
Chosen by the test team:
[List IP addresses and ranges to be tested]
Configuration Audit
Number of SysLog Servers: [x]
Windows NT
Number of servers: [x]
Percentage of servers to be tested: [x]
Number of workstations: [x]
Percentage of workstations to be tested: [x]
Number of domain controllers: [x]
Sun Solaris
Number of servers: [x]
Percentage of servers to be tested: [x]
Number of workstations: [x]
Percentage of workstations to be tested: [x]
Other UNIX
Number of servers: [x]
Percentage of servers to be tested: [x]
Number of workstations: [x]
Percentage of workstations to be tested: [x]
VAX/VMS
Number of servers: [x]
Percentage of servers to be tested: [x]
Number of workstations: [x]
Percentage of workstations to be tested: [x]
Linux
Number of servers: [x]
Percentage of servers to be tested: [x]
Number of workstations: [x]
Percentage of workstations to be tested: [x]
Win2000
Number of servers: [x]
Percentage of servers to be tested: [x]
Number of workstations: [x]
Percentage of workstations to be tested: [x]
Other Operating Systems
Number of servers: [x]
Percentage of servers to be tested: [x]
Number of workstations: [x]
Percentage of workstations to be tested: [x]
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.196.175