Guideline on Network Security Testing
Total Page:16
File Type:pdf, Size:1020Kb
Archived NIST Technical Series Publication The attached publication has been archived (withdrawn), and is provided solely for historical purposes. It may have been superseded by another publication (indicated below). Archived Publication Series/Number: NIST Special Publication 800-42 Title: Guideline on Network Security Testing Publication Date(s): October 2003 Withdrawal Date: September 2008 Withdrawal Note: SP 800-42 is superseded in its entirety by the publication of SP 800-115 (September 2008). Superseding Publication(s) The attached publication has been superseded by the following publication(s): Series/Number: NIST Special Publication 800-115 Title: Technical Guide to Information Security Testing and Assessment Author(s): Karen Scarfone, Murugiah Souppaya, Amanda Cody, Angela Orebaugh Publication Date(s): September 2008 URL/DOI: http://dx.doi.org/10.6028/NIST.SP.800-115 Additional Information (if applicable) Contact: Computer Security Division (Information Technology Lab) Latest revision of the SP 800-115 (as of June 19, 2015) attached publication: Related information: http://csrc.nist.gov/ Withdrawal N/A announcement (link): Date updated: June Ϯϯ, 2015 Guideline on Network Security NIST Special Publication 800-42 Testing Recommendations of the National Institute of Standards and Technology John Wack, Miles Tracy, Murugiah Souppaya C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 October 2003 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director SP 800-42 GUIDELINE ON NETWORK SECURITY TESTING Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to advance the development and productive use of information technology. ITL’s responsibilities include the development of technical, physical, administrative, and management standards and guidelines for the cost-effective security and privacy of sensitive unclassified information in Federal computer systems. This Special Publication 800-series reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. National Institute of Standards and Technology Special Publication 800-42 Natl. Inst. Stand. Technol. Spec. Publ. 80 0-42, XX pages (October, 2003) CODEN: XXXX X Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experime ntal procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. U.S. GOVERNMENT PRINTING OFFICE WASHINGTON: 2001 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov — Phone: (202) 512-1800 — Fax: (202) 512-2250 Mail: Stop SSOP, Washington, DC 20402-0001 ii SP 800-42 GUIDELINE ON NETWORK SECURITY TESTING Authority The National Institute of Standards and Technology (NIST) have developed this document in furtherance of its statutory responsibilities under the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. NIST is responsible for developing standards and guidelines, including minimum requirements, for providing adequate information security for all agency operations and assets, but such standards and guidelines shall not apply to national security systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency Information Systems, as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental information is provided A-130, Appendix III. This guideline has been prepared for use by federal agencies. It may be used by nongovernmental organizations on a voluntary basis and is not subject to copyright though attribution is desired by NIST. Nothing in this document should be taken to contradict standards and guidelines made mandatory and binding on federal agencies by the Secretary of Commerce under statutory authority. Nor should these guidelines be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other federal official. Acknowledgements The authors, John Wack and Murugiah Souppaya of NIST and Miles Tracy of Booz Allen Hamilton (BAH), wish to acknowledge staff at NIST and BAH who reviewed drafts of this publication and made substantial improvements to its quality, including Timothy Grance, Wayne Jansen, Tom Karygiannis, Peter Mell, Robert Sorensen, and Marianne Swanson. iii SP 800-42 GUIDELINE ON NETWORK SECURITY TESTING iv SP 800-42 GUIDELINE ON NETWORK SECURITY TESTING Table Of Contents 1. Introduction ......................................................................................................................1-1 1.1 Purpose and Scope........................................................................................................1-1 1.2 Definitions ......................................................................................................................1-2 1.3 Audience ........................................................................................................................1-3 1.4 Document Organization .................................................................................................1-3 2. Security Testing and the System Development Life Cycle ..........................................2-1 2.1 System Development Life Cycle ....................................................................................2-1 2.1.1 Implementation Stage ....................................................................................................2-2 2.1.2 Operational Stage ..........................................................................................................2-3 2.2 Documenting Security Testing Results ..........................................................................2-3 2.3 Roles and Responsibilities .............................................................................................2-4 2.3.1 Senior IT Management/Chief Information Officer (CIO).................................................2-4 2.3.2 Information Systems Security Program Managers (ISSM).............................................2-4 2.3.3 Information Systems Security Officers (ISSO) ...............................................................2-5 2.3.4 System and Network Administrators ..............................................................................2-5 2.3.5 Managers and Owners...................................................................................................2-5 3. Security Testing Techniques ..........................................................................................3-1 3.1 Roles and Responsibilities for Testing ...........................................................................3-1 3.2 Network Scanning ..........................................................................................................3-2 3.3 Vulnerability Scanning....................................................................................................3-3 3.4 Password Cracking ........................................................................................................3-6 3.5 Log Reviews...................................................................................................................3-7 3.6 File Integrity Checkers ...................................................................................................3-8 3.7 Virus Detectors...............................................................................................................3-9 3.8 War Dialing...................................................................................................................3-10 3.9 Wireless LAN Testing (“War Driving”) ..........................................................................3-10 3.10 Penetration Testing ......................................................................................................3-11 3.11 Post-Testing Actions ....................................................................................................3-16 3.12 General Information Security Principles.......................................................................3-17 3.13 Summary Comparisons of Network testing Techniques ..............................................3-19 4. Deployment Strategies for Security Testing .................................................................4-1 v SP 800-42 GUIDELINE ON NETWORK SECURITY TESTING 4.1 Determine the Security Category of the Information System .........................................4-1 4.2 Determine Cost of Performing Each Test Type per System ..........................................4-2 4.3 Identify Benefits of Each Test Type per System ............................................................4-2