Section1 Flashcards
(80 cards)
Regulations
Legally binding mandates which demands strict adherence to data protection rules
GDPR - general data protection regulation
Imposes strict rules on data processing and movement within the EU and for businesses or a company dealing with EU citizens data.
Fines up to 4% or 20 million euros
GLBA - Gramm-Leach-Bliley Act
Financial service act of 1999
Protect privacy of individuals, financial information held by financial institutions.
Includes encryption, security audits, sec measures
HIPAA- health insurance portability and accountability act
Fiscal, admin, technical safeguards.
Regulates confidentiality, and security of healthcare information
Encryption, secure access controls and reg audits
Fines: 100$ -50k. Max pen 1.5m per year
PCI DSS - payment card, industry, data security standard
For credit cards/payments
Secure networks, implementing strong, access control, conducting regular network, monitoring, and testing
5k - 100k per month until fixed
ISO / IEC 27000 series
Specifications for implementing maintaining and improving IT security management systems
Mitigate legal risks, build customer trust
Stakeholder alignment
Ensures that everyone understands the objectives, timelines and outcomes of a pen test
Types of Assessments
Network
Wireless
Application
Mobile
Web
Cloud
API
Network assessment
Network topology
Firewall configs
Security policies
Wireless assessments
Simulate attacks on wireless networks to understand security issues and provide recommendations
App assessments
Code audits
Old Dependency audits
App configs
Mobile assessments
Check data leaks
Improper session handling
Insecure data storage
Web assessments
Look for SQL injection, cross, side, scription, security misconfiguration
Cloud assessments
Check cloud configurations and compliance
API assessments
Check authentication, authorization, data handling practices
Types of agreements
NDA
MSI master service agreements
SOW statements of work
TOS terms of service
MSA master serv agreement
Project scope
Payment details
Confidentiality clauses
Liability issues
Statement of work SOW
Outline objectives, deliverables, scope of work, timelines, payment schedules, and responsibilities of each party
Legal and ethical considerations overview
Authorization letters
Mandatory reporting requirements
Potentials risks to pentester
Establish escalation path
Authorization letter
Formally grant’s permissions to pentester to conduct a simulated cyber attack against organizations systems
Mandatory reporting
Dictate how and when findings should be disclosed
Risks to tester
1.Conduct thorough risk assessment
2.implement precautionary measures to protect system
3.establish mutual understanding with client
Escalation path
Outline chain of command.
Mitigates: operation interference, system, interference, accidental breach of data
Rules of engagement overview
Exclusions
Test cases
Test window
Goal reprioritization
Business impact analysis