vulnerability assessment and penetration testing to secure ...€¦ · develop byod policy to allow...

25
databrackets [email protected] 866-276-8309 Vulnerability Assessment and Penetration Testing (VAPT) to Secure Data

Upload: others

Post on 24-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

[email protected]

866-276-8309

Vulnerability Assessment and Penetration Testing (VAPT) to Secure Data

Page 2: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

DIY TOOLKITDIY assessment, training,customized policies & proceduresand much more …

CONSULTINGProfessional servicesto help you with your Compliance needs

WHO WE ARE …

We assist organizations in developing and implementing practices to secure sensitive

data and comply with regulatory requirements.

1

MANAGED SERVICESManaged compliance and security services to focus on your key business outcome.

Page 3: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

DISCLAIMERConsult your attorney

2

ALL WEBINARS ARE RECORDED AND AVAILABLE AS AN “ON DEMAND” SUBSCRIPTION

This webinar has been provided for educational and informational purposes only and is not intended and should not be construed to constitute legal advice.

Please consult your attorneys in connection with any fact-specific situation under federal law and the applicable state or local laws that may impose additional obligations on you and your company.

Page 4: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

Srini’s Background

3

• Security and Compliance

• Cisco IT Infrastructure

• HIPAA, PCI, Sarbanes-Oxley and ISO 27k Series

• A member of Rotary Club of Morrisville

• Interests: Running, healthy living and giving back

Srini KolathurCISSP, CISA, CISM, MBA

Director, databrackets

Page 5: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

1 BACKGROUND

2 VAPT WORKFLOW

3 GOAL & OBJECTIVE

4 SCOPE

6 VULNERABILITY DETECTION

AGENDA

5 INFORMATION GATHERING

Always available via email to answer any questions

7 INFORMATION ANALYSIS & PLANNING

8 ATTACKS & PENETRATION

9 PREVILEGE ESCALATION

10 RESULT ANALYSIS

11 REPORTING & CLEAN-UP

13 NEXT STEPS

12 SUMMARY

14 Q&A

Page 6: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

WHY VAPT

5

• Required to protect your critical information assets

• Many of B2B customers might demand it

• Compliance requirement (NY Cybersecurity, GDPR, ISO

27k, etc.)

• Insurance claims/due-diligence

• Best business practiceHow frequently to conduct VAPT vs. why you should conduct VAPT

Page 7: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

© 2015 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected].

Page 8: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

WHO DOES IT APPLY TO …

Develop BYOD policy to allow use of personal devices to access patient data

Anyone having sensitive data:

❑ Customer data

❑ Employee data

❑ Financial data

❑ Health data

Exception for HIPAA, CMIA ( California Medical Information Act), GLBA (Gramm Leach Bliley Act ) statues

Page 9: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

VA

PT W

OR

KFLO

W

Workflow steps might vary based on the scope, objectives and architecture

Page 10: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

1. GOAL & OBJECTIVES

Develop BYOD policy to allow use of personal devices to access patient data

Two distinct objectives- Vulnerability assessment tools discover which vulnerabilities are present- Penetration test attempt to utilize the vulnerabilities in a system to determine if any unauthorized access or other malicious activity is possible and identify the threats

Sample Goal Statement:• One of the major goals of the project is to educate developers

in the field of application software security

Is the Goal Statement stated as a SMART goal?

Page 11: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

2. SCOPE

Develop BYOD policy to allow use of personal devices to access patient data

The scope for each test depends on the company, industry, compliance standards, etc. • Any and all devices with an IP address can be considered for a VAPT

activity• Penetration testing should focus on your organization's external

parameters (IP Addresses, Offices, People, etc.)• Vulnerability assessment should focus on your internal infrastructure

(servers, databases, switches, routers, desktops, firewalls, laptops, etc.)• Anything out of bounds for the project

Customer needs, compliance and security validation are the main drivers to define the scope of VAPT exercise

Page 12: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

SCOPE …Cont’d.

Develop BYOD policy to allow use of personal devices to access patient dataTesting is usually a combination of manual/automated method

Types of Penetration Testing :

❑ Network

❑ Application Security

❑ Physical

❑ Social Engineering

Page 13: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

3. INFORMATION GATHERING

Develop BYOD policy to allow use of personal devices to access patient data

• Black Box/White box/Gray Box

Gathering intelligence (e.g., network and domain names, mail server) to better understand how a target works and its potential vulnerabilities

Need to include all of information assets to identify the risks during this discovery phase

Page 14: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

4. VULNERABILITY DETECTION

Develop BYOD policy to allow use of personal devices to access patient data

The most important step :

Gathering intelligence (e.g., network and domain names, mail server) to better understand how a target works and its potential vulnerabilities

Mostly automated vulnerability scanning tools are used for identifying the vulnerabilities

Page 15: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

5. ATTACKS & PENETRATION

Develop BYOD policy to allow use of personal devices to access patient data

1. Discover/Map 2. Reconnaissance 3. Discovery 4. Public Domain Sources 5. Port Scanning 6. Identification of Services 7. Short Listing of Crucial IPs 8. Identification of Operating System 9. Identification of Vulnerabilities 10. Exploitation of Vulnerabilities 11. Privilege Escalation12. Other Attacks

Depending on the complexity of the system additional steps might be required

❑ Nessus

❑ Meta Spoilt

❑ Burp Suite

❑ And many other tools…

Page 16: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

6. RESULT ANALYSIS

Develop BYOD policy to allow use of personal devices to access patient data

- False positive- Prioritized issues- Follow-up testing

The key is to eliminate all unwated noises so that organization can focus on key infrastructure/risks on a timely manner.

Page 17: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

7. REPORTING

Develop BYOD policy to allow use of personal devices to access patient data

Report format: • Introduction

• Objectives of the assignment • Scope of the assignment • Standards followed • Duration of the assignment

• Management Summary • High-level findings • High-level recommendations • Graphical summary

• Technical Report • This report will contain the vulnerabilities discovered with CVE ratings and the mitigation

recommendations • Conclusion

High level summary reports are frequently shared with all stakeholders to share the risks/exposure

Page 18: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

8. CLEAN-UP

Develop BYOD policy to allow use of personal devices to access patient data

• Removing any executables, scripts and temporary files from compromised systems

• Reconfiguring settings back to the original parameters prior to the pentest• Eliminating any rootkits installed in the environment• Removing any user accounts created to connect to the compromised system

Clean-up is one of the most important steps during VAPT

Page 19: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

18

NEXT STEPS

Contact databrackets for free no-obligation evaluation on your penetration testing and vulnerability assessment needs

866-276 8309 or [email protected]

Page 20: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

© 2015 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected].

Page 21: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

20

UPCOMING EVENTS

❑ Business Continuity and Disaster Recovery – 11/7

Register now >> databrackets.com/webinars

Page 22: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

CALL US

866-276 8309SERVICE

[email protected]

150, Cornerstone Dr. Cary, NC

SOCIALIZE

FacebookTwitter

FIND US

Twitter: @databrackets Facebook: databrackets21

Page 23: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

22

Please don’t hesitate to ask

Questions

Page 24: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

23

for your attention!

Thank You

Page 25: Vulnerability Assessment and Penetration Testing to Secure ...€¦ · Develop BYOD policy to allow use of personal devices to access patient data The scope for each test depends

Thank you for joining us today

23 October, 2019

24

To purchase reprints of this document, please email [email protected].