Information Systems Security Assessment Framework (ISSAF) Draft 0.1 1 ABOUT ISSAF 1.1 PREFACE Today, the evaluation of Information Systems (IS) security in accordance with business requirements is a vital component of any organizations business strategy. While there are a few information security assessment standards, methodologies and frameworks that talk about what areas of security must be considered, they do not contain specifics on HOW and WHY existing security measures should be assessed, nor do they recommend controls to safeguard them. The Information System Security Assessment Framework (ISSAF) is a peer reviewed structured framework that categorizes information system security assessment into various domains & details specific evaluation or testing criteria for each of these domains. It aims to provide field inputs on security assessment that reflect real life scenarios. ISSAF should primarily be used to fulfill an organization’s security assessment requirements and may additionally be used as a reference for meeting other information security needs. ISSAF includes the crucial facet of security processes and, their assessment and hardening to get a complete picture of the vulnerabilities that might exists. The information in ISSAF is organized into well defined evaluation criteria, each of which has been reviewed by subject matter experts in that domain. These evaluation criteria include: A description of the evaluation criteria. Its aims & objectives The pre-requisites for conducting the evaluations The process for the evaluation Displays the expected results Recommended countermeasures References to external documents Overall framework is large, we chose to provide as much information as possible on the assumption that it would be easier for users to delete material rather than develop it. The © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 2 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 Information System Security Assessment Framework (ISSAF) is an evolving document that will be expanded, amended and updated in future. 1.1.1 What are the Objectives of ISSAF? To act as an end-to-end reference document for security assessment To standardize the Information System Security Assessment process To set the minimal level of acceptable process To provide a baseline on which an assessment can (or should) be performed To asses safeguards deployed against unauthorized access To act as a reference for information security implementation To strengthen existing security processes and technology 1.1.2 What are the Goals of ISSAF? The goal of the ISSAF is to provide a single point of reference for security assessment. It is a reference that is closely aligned with real world security assessment issues and that is a value proposition for businesses. To this aim the ISSAF has the following highlevel agenda: Evaluate the organizations information security policies and ensure that they meet industry requirements & do not violate any applicable laws & regulations Identify critical information systems infrastructure required for the organizations business processes and evaluate their security Conduct vulnerability assessments & penetration tests to highlight system vulnerabilities thereby identifying weaknesses in systems, networks and applications Evaluate controls applied to various security domains by: o Finding mis-configurations and rectifying them o Identify known and unknown risks related to technologies and address them o Identify known and unknown risks within your people or business processes and address them o Strengthening existing processes and technologies Prioritize assessment activities as per system criticality, testing expenses, and expected benefits Educate people on performing security assessments © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 3 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 Educate people on securing systems, networks and applications Provide information on o The review of logging, monitoring & auditing processes o The building and review of Disaster Recovery Plan o The review of outsourcing security concerns Compliance to Legal & Regulatory Standards Create Security Awareness Effective Management of Security Assessment Projects Guarding against social engineering exploitation Physical security control review This approach is based on using the shortest path required to achieve one’s goal by finding flaws that can be exploited efficiently, with the minimal effort. The goal of this framework is to give completeness and accuracy, efficiency to security assessments. 1.1.3 Why we had come up with ISSAF? After working on many information assurance projects, the lack of a comprehensive framework that provides information security assurance through performing standardized vulnerability assessment, penetration testing, security assessment and security audit, was felt. ISSAF is a comprehensive and in-depth framework that helps avoid the risk inherent in narrow or ineffective security assessment methodologies. In ISSAF we have tried to define an information system security assessment methodology that is more comprehensive than other assessment frameworks, it seeks to mitigate the inherent risk in the security assessment process itself. It helps us understand the business risks that we face in performing our daily operations. The threats, vulnerabilities, and potential exposures that affect our organizations are too huge to be ignored. At this particular time it is not the answer to every question or situation, but we are committed to continuous improvement by improving current topics and adding new topics. © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 4 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 ISSAF has laid the foundation; now it’s your turn to benefit from it, whether you use it as is or tailor the materials to suit your organization needs. Welcome to ISSAF, we hope you will find it useful. 1.2 TARGET AUDIENCE This framework is aimed at a wide spectrum of audiences that include: Internal and External Vulnerability Assessors, Penetration Testers, Security Auditors and Security Assessors Professionals responsible for information security perimeter security Security engineers and consultants Security assessment project managers Information system staff responsible for information security System/network/Web administrators Technical and Functional Managers © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 5 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 1.3 CONTRIBUTORS 1.3.1 Contributor Contacts and References -Ascending order by Name © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 6 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 1.3.2 Contributors as per Domain Domain Author[s] Project Management S.Saravanan and Balwant Rathore Best Practices – PreAssessment, Assessment, Post Balwant Rathore Assessment Evaluation of Third Party Contracts Assessment Framework Contributor[s] Viraf Hathiram S.Saravanan Omar Herrera Dieter Sarrazyn Balwant Rathore Balwant Rathore Umesh Chavan Johnny Long Gareth Davies Technical Control Assessment Methodology Balwant Rathore Pukhraj Singh Param Singh Dieter Sarrazyn Kartikeya Puri Review Information Security Policy And Security Umesh Chavan R.S. Sundar Organization Review Risk Assessment And Umesh Chavan Classification Balwant Rathore Major Gajendra Singh Bernardo Reino aka lepton Password Security Miguel Dilaj Piero Brunati Matteo Brunati Password Cracking Strategies Unix /Linux System Security Assessment Pietro Brunati Miguel Dilaj Arturo "Buanzo" Busleiman Balwant Rathore Kartikeya Puri Jayesh Thakur Linux Audit Check-List Hiten Desai Linux Audit Tool Hiten Desai Solaris Audit Check-List Jayesh Thakur Solaris Audit Tool Vijay Ganpathy Windows System Security Bernardo Reino aka lepton Balwant Rathore Arturo "Buanzo" Busleiman Dieter Sarrazyn R.S. Sundar Kartikeya Puri © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 7 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 Assessment Windows Security Audit Tool Desktop Security Checklist - Oscar Marin Dieter Sarrazyn Umesh Chavan Balwant Rathore Balwant Rathore Kartikeya Puri Database Security Assessment K. K. Mookhey Balwant Rathore Wireless Security Assessment Balwant Rathore Windows Novell Netware Security Assessment Wi-fi Security Assessment Physical Security Assessment J Sheik Abdulla Anish Mohammed Balwant Rathore Balwant Rathore Umesh Chavan Switch Security Assessment Balwant Rathore Cesar Tascon Router Security Assessment Balwant Rathore Manish Uboveja Firewall Security Assessment Balwant Rathore Dieter Sarrazyn Default Ports – Firewall Intrusion Detection System Security Assessment Default Ports – IDS/IPS VPN Security Assessment Anti-Virus System Security Assessment And Management Strategy Web Application Security Web Application Security – SQL Injections Vinay Tiwari Balwant Rathore Rishi Pande Balwant Rathore Balwant Rathore Umesh Chavan Miguel Dilaj Balwant Rathore Hemil Shah Balwant Rathore IIS Audit Check-List Hernan Marcelo Racciatti And Disaster Recovery Dragos Gabrial O. Zabal Balwant Rathore Business Continuity Planning Oliver Karow Vinary Tiwari Web Server Security Binary Auditing Dieter Sarrazyn Hernan Marcelo Racciatti Rahul Balwant Rathore R.S. Sundar © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 8 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 Disaster Recovery Planning Social Engineering Kalpesh Doshi Umesh Chavan Dragos Incident Analysis Muhammad Faisal Rauf Danka Storage Area Network (SAN) Balwant Rathore Security Hari Prasad Chede Internet User Security Balwant Rathore Review Of Logging / Monitoring R.S. Sundar & Auditing Processes Umesh Chavan Assess Outsourcing Security Concerns Security Awareness And Training Balwant Rathore Balwant Rathore Kartikeya Puri Thanzeer Umesh Chavan R.S.Sundar Salman Ashraf Patrick Balwant Rathore Knowledge Base Legal Aspects Of Security Balwant Rathore Assessment Projects Sandhya Khamesra Dos Attacks: Instigation And Mitigation Jeremy Martin Virus & Worms Jeremy Martin Cryptography Jeremy Martin Non-Disclosure Agreement (NDA) Balwant Rathore Security Assessment Balwant Rathore Contract Sandhya Khamesra Request For Proposal Template Vulnerability Assessment / Penetration Testing Lab Links Report Template Balwant Rathore Hamid kashfi Balwant Rathore Marko Marko Ruotsalainen Balwant Rathore Umesh Chavan © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 9 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 1.3.3 Key Contributors Introduction Umesh Chavan Umesh Chavan is an information security professional with over 7 years of Experience & holds a CISSP. He is currently working with CoreObjects, India where he is involved in the development of security products. Prior to this he worked with JP Morgan Chase as an Information Risk manager & as an Information Security Specialist with Larsen & Toubro Infotech Ltd. He has exposure to the various domains in security and has a unique blend of both process & technical knowledge. He likes conversing with people, sharing new ideas and enriching his knowledge not necessarily restricted to the field on information security. Miguel Dilaj Born in 1971 Started using computers in 1982 (venerable C64). Migrated to Amiga in the late 80's (still have and use regularly a PowerPC Amiga) Became involved with PC and AS/400 in the 90's. First serious use of Linux in 1998 (RedHat 5.1), tried FreeBSD, NetBSD and OpenBSD and fall back to Linux RedHatbased, Slackware-based and Debian-based distros tried. Currently using Debian-based, Continuous Windows use from 3.0 up to XP Pro Became deeply into IT Security in '98, when it started to be possible to have real control of the situation (i.e. Linux!) Started training other people in Linux and IT Security in 2000, currently working in the Quality Assurance and Automation fields (Computerized System Validation) Interested in clusters and their use for password auditing © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 10 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 Piero Brunati Co-founder of Nest (www.nestonline.com) where he performs Research, Ethical Hacking and develops software, he tries hard to mitigate customers' nightmares. He begun butchering computers since the good old 70's, when he spent his first salary to buy the components he used to solder his first computer (8008 CPU, 2k static RAM, 2k EPROM, serial and parallel I/O). K. K. Mookhey K. K. Mookhey is the Founder and Chief Technology Office of Network Intelligence (www.nii.co.in), an information security consulting firm. He has provided security consulting services to Fortune 500 companies and industry segment leaders in India, Middle East, and North America. He has pioneered the development of the AuditPro suite of security auditing software, as well as initiated the research efforts within the company. His vulnerability research team has found security vulnerabilities in products from vendors such as Oracle, Symantec, and Macromedia. He is a regular contributor to the Infocus series of articles on SecurityFocus, as well as various industry journals such as IS Control and IT Audit. He is the author of a monograph on "Linux Security Audit and Controls" commissioned by the Information Systems Audit and Control Association (ISACA). He is also the author of the chapter on “Web Application Attacks” in the upcoming version of the OWASP Guide. Dieter Sarrazyn Dieter Sarrazyn has been an information security consultant and trainer for more than 6 years now. Dieter is a certified and experienced Professional in the areas of creating secure information systems and network architectures, Performing Security Audits of Systema and Network infrastructures, performing penetration tests and installing and configuring firewall and VPN solutions. Other expertise lays in the areas of system and network management, installing and configuring antivirus solutions and installing & configuring mail relay systems. © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 11 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 Dieter first worked as a Security Engineer in a Network Integration Company and then moved towards Security Consulting at the company he's still working for. His main tasks are performing penetration testing, security auditing and teaching the Hacking Inside Out course. He is also a Local Mentor for SANS tracks 1 and 4. Dieter has earned the following certifications: CISSP, GSEC, GCIH, CCSA & CCSE. © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 12 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 1.4 DOCUMENT ORGANIZATION AND CONVENTIONS 1.4.1 Document Organization This framework briefly discusses the requirements for security assessments and explains in detail the methodology of security assessments. The sections are organized as follows: 1. Project Management 2. Guidelines And Best Practices – Pre Assessment, Assessment And Post Assessment 3. Assessment Methodology 4. Review Of Information Security Policy And Security Organization 5. Evaluation Of Risk Assessment Methodology 6. Technical Control Assessment Technical Control Assessment - Methodology Password Security Password Cracking Strategies Unix /Linux System Security Assessment Windows System Security Assessment Novell Netware Security Assessment Database Security Assessment Wireless Security Assessment Switch Security Assessment Router Security Assessment Firewall Security Assessment Intrusion Detection System Security Assessment VPN Security Assessment Anti-Virus System Security Assessment And Management Strategy Web Application Security Assessment Storage Area Network (San) Security Internet User Security As 400 Security Source Code Auditing Binary Auditing © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 13 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 7. Social Engineering 8. Physical Security Assessment 9. Incident Analysis 10. Review Of Logging / Monitoring & Auditing Processes 11. Business Continuity Planning And Disaster Recovery 12. Security Awareness And Training 13. Outsourcing Security Concerns 14. Knowledge Base Legal Aspects Of Security Assessment Projects Non-Disclosure Agreement (NDA) Security Assessment Contract Request For Proposal Template Desktop Security Check-List - Windows Linux Security Check-List Solaris Operating System Security Check-List Default Ports - Firewall Default Ports – IDS/IPS Links Penetration Testing Lab Design 1.4.2 Document Convention Many places in this document we use following test case template: © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 14 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 Heading of Topic Introduction (Description / purpose / requirement / terminology / history) Objective 1 (SECURITY TExpected ESTERResults ’S AND SYSTEM ADMINISTRATOR’S PERSPECTIVE) Methodology (Structured steps that needs to be followed to complete test case) Per Test / Technique Description Objective Expected Result Pre-requisite Process (Steps to complete this task) [Description] [Example/Results] [Countermeasure] Example/Results of common testing tool(s) Countermeasure(s) Further Reading(s) Contributor(s) Global Comments Global Countermeasure(s) Contributor(s) Further Reading(s) © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 15 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 1.5 DISCLAIMER While all possible precautions have been taken to ensure accuracy during the development of the Information System Security Assessment Framework (ISSAF), also referred to as ISSAF, the Open Information System Security Group (OISSG) assumes no responsibility for any damages, errors or downtime resulting or caused by the use of the information contained herein. OISSG does not warrant or assume any legal liability or responsibility for the completeness, usefulness, accuracy of the information presented in this document. OISSG will not be responsible for any damage, malfunction, downtime, or other errors that might result from the usage of this document. 1.6 LICENSING We impose no restrictions to any individual/organization for practicing the ISSAF Any individual/organization will be granted unlimited distribution of the ISSAF provided the copyright is included in the document & the authors name[s] are maintained in the document after the final release of ISSAF. This release is a draft and to distribute it, one needs to take permission from OISSG. We impose no restrictions to any individual/organization to develop products based on it. A written authorization is required from OISSG for any individual or organization that provides training based on ISSAF and/or wants to use ISSAF material for commercial training purposes Generally tools developed for ISSAF assessment are released under GNU GPL (http://www.opensource.org/licenses/gpl-license.html) OISSG reserves the right to change the licensing policy at its own discretion. Do reach us for more detail on our licensing at licensing@oissg.org © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 16 of 17 Information Systems Security Assessment Framework (ISSAF) Draft 0.1 © 2004, Balwant Rathore, Open Information Systems Security Group (www.oissg.org) Date: 3/9/2016 Page 17 of 17