Skip to the content.

Audits and Assessments

Internal Audits

Internal Audits are systematic evaluations of the effectiveness of internal controls, compliance, and integrity of information systems and processes.

How it works

  1. Internal audit team checks control policies and procedures agains best practices and regulatory requirements.
  2. User access rights is examined ensure each employee’s access is align with their responsibilities.
  3. Audit team verifies user access rights processes, including approvals and timely revocation.
  4. Finally, they test the effectiveness of access controls using accounts with limited permissions.
  5. Findings are documented and used as basis for recommendation for procedure improvements

Compliance

Compliance ensures that information systems and security practices meet established standards, regulations, and laws.

To learn more, please Compliance as a Governance Element.

Audit Committee

A group of people responsible for supervising the organization’s audit and compliance functions.

Internal Assessments

An in-depth analysis to identify and assess potential risks and vulnerabilities in an organization’s information systems.

Assessment Process

  1. Conducting threat modelling exercise to identify potential threats.
  2. Combination of automated tools and manual testing techniques are used to assess vulnerabilities.
  3. Risks assessment, for evaluating potential impact of the identified threats and the cost of implementing security measures.
  4. Mitigation strategies are recommended based on the assessment results

Example of Self Assessment Questionnaire

Below is an excerpt from the Self-Assessment Questionnaire provided by Cyber Security Agency of Singapore. The full questionnaire can be found here.

External Audits and Assessments

External Audits

External Audits are systematic evaluations carried out by external entities to assess an organization’s information systems and security controls.

External Assessments

Detailed analysis conducted by independent entities to identify vulnerabilities and risks.

Regulatory Compliance

Objective that organizations aim to reach in adherence to applicable laws, policies, and regulations.

Independent Third-Party Audit

Offers validation of security practices, fostering trust with customers, stakeholders, and regulatory authorities.

Example of HIPAA Audit Checklist

Below is an excerpt from the HIPAA Audit Checklist provided by San Bernardino County.

Penetration Testing

Penetration Testing is a simulated cyber attack that helps in the assessment of computer systems for exploitable vulnerabilities.

Types:

Physical Pentesting

Physical pentesting involves evaluating the physical security measures of a facility to identify vulnerabilities that could be exploited to gain unauthorized access to sensitive areas or information.

Offensive Pentesting

Offensive pentesting, also known as red teaming, is a proactive approach that focuses on simulating real-world attacks to identify weaknesses in an organization’s security infrastructure from an attacker’s perspective.

Defensive Pentesting

Defensive pentesting, also known as blue teaming, is a reactive approach that emphasizes identifying and fortifying weaknesses within an organization’s defenses by simulating potential attack scenarios.

Integrated Pentesting

Integrated pentesting, also known as purple teaming, combines both offensive and defensive strategies to create a comprehensive security evaluation, ensuring that both attack simulations and defensive measures are optimized.

Penetration Testing Process

Penetration testing is a structured approach to identifying and exploiting vulnerabilities in a system to assess its security.

  1. Rules of Engagement

    • Define the scope and objectives of the test.
    • Establish clear communication channels and protocols.
    • Ensure legal and ethical boundaries are respected.
  2. Discovery/Enumeration

    • Gather information about the target system.
    • Identify open ports, services, and potential entry points.
    • Map the network and identify connected devices.
  3. Vulnerability Identification and Exploitation

    • Scan for known vulnerabilities and weaknesses.
    • Attempt to exploit identified vulnerabilities.
    • Validate the exploitability and impact of each vulnerability.
  4. Privilege Escalation, Backdoors, and Pivoting

    • Attempt to gain higher-level access to the system.
    • Install backdoors for future access if permitted.
    • Use the compromised system to access other network areas.
  5. Cleanup

    • Remove any tools or scripts used during the test.
    • Restore the system to its original state.
    • Ensure no traces of the test remain on the target.
  6. Report Findings

    • Document all discovered vulnerabilities and exploited weaknesses.
    • Provide detailed findings, including evidence and impact analysis.
    • Offer recommendations for remediation and improving security posture.

Reconnaisance in Pentesting

Reconnaissance, also known as information gathering, is the first phase of a penetration test where the pentester collects as much information as possible about the target system to identify potential vulnerabilities.

Types of Reconnaissance

Active Reconnaissance

Passive Reconnaissance

Environment Classifications

Environment classifications define the level of information available to the tester about the target system. This classification helps in simulating different attack scenarios, ranging from those performed by internal employees to external attackers with no prior knowledge of the system.

Known Environment

Partially Known Environment

Unknown Environment

Methods and Techniques

Open Source Intelligence (OSINT)

Network Scanning

Footprinting

Social Engineering

Tools

Here’s the information converted into a table format:

Tool Description
Nmap A network scanning tool to discover hosts and services on a network.
Shodan A search engine for Internet-connected devices to find exposed systems.
WHOIS Lookup A protocol used to query databases for domain registration information.
Google Dorking Using advanced search techniques to find specific information on the web.
curl A command-line tool for transferring data with URLs.
scanless A tool to perform open port scans using multiple online scanners.
dnsenum A DNS enumeration tool that helps in gathering information about DNS servers and records.
tcpreplay A suite of tools to edit and replay captured network traffic.
Cuckoo An automated malware analysis system.
theHarvester An information gathering tool to get emails, subdomains, hosts, employee names, open ports, and banners.
hping3 A network tool able to send custom TCP/IP packets and to display target replies like ping does with ICMP replies.
Metasploit Framework A penetration testing framework that helps identify and exploit vulnerabilities.

Attestation of Findings

Process that involves the formal validation or confirmation provided by an entity that is used to assert the accuracy and authenticity of a specific information.

Types:

Software Attestation

Software attestation verifies the integrity and authenticity of software running on a device, ensuring that it has not been tampered with or compromised.

Hardware Attestation

Hardware attestation ensures that the physical hardware of a device is authentic and has not been altered or replaced with malicious components.

System Attestation

System attestation involves validating the overall security posture of an entire system, including both its hardware and software components.


Back to main page