How to develop a security test strategy, part three

This is the third in a series of posts describing how to put together a security testing stategy and the associated test plans. Part one is here and part two is here.

This is what I want to see covered in security test plans. Whenever I ask the supplier to specify or carry out the security tests I ensure I get to review and approve the test plans and the test outputs as part of the formal project deliverable process. I also try to make sure that the inputs to the test plan are made available to the actual security testers completing the test so they get a better feel for what the context of their test results is. Read the rest of this entry »

How to develop a security test strategy, part two

This is the second in a series of posts describing how to put together a security testing stategy and the associated test plans. Part one is here and part three is here.

What do you need to write a security test plan?

The folowing documents comprise the list of what I would expect as inputs to the creation of the individual security test plans. This is a good point to go and review your overall security delivery plan. Does it include these documents as deliverables? Does the supplier have any of these as standard off-the-shelf products? Read the rest of this entry »

How to develop a security test strategy, part one

This is the first of a series of posts describing how to put together a security testing strategy and the associated test plans. Part two is here and part three is here.

What is a security test strategy

A security test strategy is a key document deliverable to get into the master plan for delivery. It sets the expectations for everyone involved and gives the project managers and programme managers the material they need to build and run their own plans. Read the rest of this entry »

What I need from pen test reports.

I get a lot of pen test reports to read. They vary from beautifully crafted prose extolling the skilled exploitation of the system by security testing artistes to functional dumps of tool output into a word format by jobbing vulnerability scanners.

Usually I read that report once, I use the summary to know what detail I need to understand and use the the risk or vulnerability tables to pinpoint the urgent issues to fix. Those vulnerability tables are then transfered to spreadsheets where extra columns tracking the management of the issues identified are added and populated.
Read the rest of this entry »

Infosec London, BsidesLondon & DC4420 – A busy few days

This week I dived back into the UK security industry outside my current little security silo to see what people were up to and see what I’d missed.

I made it to Infosecurity Europe 2011 on Tuesday afternoon. Infosec is a vendor exhibition, they’ve tagged on a set of lectures but they are basically vendor pitches in more of an infomercial style than on the exhibition floor. I loathe the experience on the exhibition floor at Infosec, the rampant commercialism and the lack of detail makes it a terrible place to learn anything new. It is however a great place to waste time talking to bug vendor sales people who know less about their products than you do and spend an afternoon ducking the slightly desperate gaze of the small vendors and professional service firms in the various ghettos in the rear corners.

That said I met a lot of good guys I hadn’t seen for months or years wandering around the corridors, Infosec does draw everyone out into the daylight and the coffee is a lot better than it used to be. The move the Earls Court has made it a lot more convenient and the local pubs are comfortable so it’s not wasted time. Someone is going to come up with a killer app for real world exhibition networking, finding who of your friends and colleagues are there when you are and where in the hall they are or which pub they are in that is going to shift the whole emphasis of exhibitions like Infosec.

I probably will stick to my schedule of every other year for Infosec in the meantime.

Wednesday I headed over to BsidesLondon, a new free security conference in London. It was in a great venue and I was a little blown away by the amount of new young security talent in the room, also surprised and heartened by the large number of Unconvention attendees lurking around the crowd. They opened with the statement there were’nt any security conferences in the UK, I think every Unconner I met told me about that 🙂 The content of the con was okay but I’m not at all sure I learnt anything new.

  • David Rooks talk on using risk as a way of communicating to the business about technical security flaws was as worthy as the subject’s been since 2000, good content but little that was new.
  • Chris Wysopal stood up for Veracode and told us how to translate security flaws into dollar estimates of risk. I really liked  his approach, I also now that if I was presented it as a client I if I wanted I could use the chained assumptions to undermine the argument which makes it pretty much state of the art these days, useful way of talking to the C*O but dangerous around security professionals with different commercial agendas. I was especially taken with his use of the dollar value of risk from other areas such as legal, compliance and the rest that are effectively competing for the controls budget with security. If we could aim for a set of metrics that not only tell us a dollar value for security risk held and legal risk held and compliance risk held but also the cost per $100 of risk to manage in those different areas then we might see security’s big problem. I’m pretty sure (In an unprovable hand-wavy sense) that  managing $100 of technical security risk costs a lot more than managing $100 of legal risk or compliance risk.
  • Stephen Bonner did a particularly entertaining talk on recruitment failures in Infosec, that man knows how to work a room 🙂
  • Steve Lord did a great if somewhat self-regarding talk on the life-cycle of the penetration tester through their career. I suspect it was a talk on Steve’s career as a pen tester but there were enough resonances there for the old crowd in the audience to chuckle all the way through

I like BsidesLondon and I would recommend it to new pen testers getting started and I think as it develops it will find a ‘house style’ but at the moment it was entertaining rather than enlightening. It was run incredibly well and has set a bar for future Uncons to do better. Hey if they can do it surely we can too 🙂

Wednesday night was Alien8s DC4420 for the month, it was a huge meet due to being in Infosec week but was full of a good crowd. DC4420 has interesting talks, Mu-bs slightly political take on sat card sharing was my highlight but is mainly a social event and a good time was had by all. I must make an effort to get 4420 more often.

All in all the UK tech security scene seems healthy, some new companies starting up to fill the spaces left by the recent acquisitions, good people still contributing good content. I’m definitely part of the ‘old guard’ now and that’s probably exactly right.

 

 

Twitter RSS