6.2 Key Concepts Conduct Security Controls Test Flashcards
Domain 6 (53 cards)
includes routine vulnerability scans and periodic vulnerability
assessments, but encompasses a larger set of processes that support the risk management
process. This is the overarching process/practice for identifying, tracking, and remediating vulnerabilities on an ongoing basis.
Vulnerability Management
extend beyond just technical scans and can include configuration
and process reviews and audits to detect vulnerabilities.This is the process of human assessment of vulnerability scans and the organization’s security posture.
Vulnerability Assessments
involves confirming the individual vulnerability, prioritizing it using
CVSS and CVE, and considering organization-specific factors.
Vulnerability Analysis
can detect known security vulnerabilities and weaknesses,
absence of patches or weak passwords. are used in performing
vulnerability scans, which serve as inputs to the assessment process.
Vulnerability Scanning
- Identification: Vulnerability identification can come from scans, penetration tests,
responsible disclosure, bug bounty programs, and audit results. - Analysis: Vulnerability analysis involves confirming the vulnerability, prioritizing it using
CVSS and CVE, and considering organization-specific factors. - Responses: Vulnerability responses include applying patches, isolating affected systems,
implementing compensating controls, transferring risk through insurance, or formally
accepting the risk. - Validation ensures the vulnerability is no longer present.
- Reporting informs stakeholders about the findings, actions, trends, and recommendations
for improvement.
Vulnerability Lifecycle
is simply a list of all publicly disclosed vulnerabilities that includes the CVE ID, a description, dates, and comments.
Common Vulnerabilities and Exposures (CVE)
is the overall score assigned to a vulnerability.
It indicates severity and is used by many vulnerability scanning tools.
Common Vulnerability Scoring System (CVSS)
includes user credentials to authenticate against
targets. It is a more powerful version of the vulnerability scan because it has higher
privileges than a non-credentialed scan.
Credentialed Scan
will identify vulnerabilities that an
attacker would easily find anonymously. It has lower privileges than a credentialed scan.
Non-Credentialed Scan
These are passive and merely report vulnerabilities. They do not
cause damage to your system.
Non-Intrusive Scans
Can cause damage as they try to exploit the vulnerability and should be used in a sandbox and not on your live production system.
Intrusive Scans
Configuration compliance scanners and desired state configuration
in PowerShell ensure that no deviations are made to the security configuration of a
system.
Configuration Review
These scans look at computers and devices on your network and help
identify weaknesses in their security.
Network Scans
Before applications are released, coding experts perform regression
testing that will check code for deficiencies.
Application Scans
Crawl through a website as if they are a search engine looking
for vulnerabilities.
Web Application Scans
A technique that scans a range of IP addresses to identify
systems and open network ports, providing a report of detected systems and exposed
ports without probing for vulnerabilities.
Network discovery scanning
A method that sends a single packet with the SYN flag set to each
scanned port, indicating a request to open a new connection; also known as “half-open”
scanning.
TCP SYN Scanning
A scan type used when the user lacks permissions to run a halfopen
scan, completing the full TCP handshake
TCP Connect Scanning
A technique that sends a packet with the ACK flag set, attempting to
determine firewall rules and methodology.
TCP ACK Scanning
A method that checks for active UDP services on a remote system using the connectionless UDP protocol
UDP Scanning
A scanning technique that sends a packet with the FIN, PSH, and URG
flags set, named for its “lit up” appearance resembling a Christmas tree.
Xmas Scanning
is a reconnaissance technique used in network security and penetration testing to
identify the specific version and type of software running on a networked system
or server. It is commonly used for fingerprinting web servers, revealing type and
version, enabling the attacker to focus on the known vulnerabilities of that platform
and version.
Banner grabbing
is an active test that attempts to exploit discovered vulnerabilities
penetration test
This is the initial information gathering stage. Testers collect data about the target system or network using both passive and active methods. This may
include:
* Open-source intelligence (OSINT) gathering
* Social engineering
* Network scanning
* Public records searches
GOAL: to build a comprehensive picture of the target environment.
Reconnaissance