Conducting Penetration Test Exercises CIO-IT Security-11-51
Total Page:16
File Type:pdf, Size:1020Kb
IT Security Procedural Guide: Conducting Penetration Test Exercises CIO-IT Security-11-51 Revision 4 January 18, 2018 Office of the Chief Information Security Officer CIO-IT Security-11-51, Revision 4 Conducting Penetration Test Exercises VERSION HISTORY/CHANGE RECORD Change Person Posting Page Number of Change Reason for Change Number Change Change Revision 1 – April 30, 2012 Bo Berlas Clarified guidance relating to Penetration testing shall occur performance of penetration against production environments 1 testing against development to ensure testing activities reflect 8 environments. the risks of the system under review. Revision 2 – December 11, 2014 Bo Berlas Changed requirement for Focuses penetration testing penetration testing from ALL activities at areas of greatest risk. systems (i.e., FIPS PUB 199 Aligns with updated Low, Moderate and High) to requirements in GSA IT Security 1 Pages 4 and 8 FIPS PUB 199 Low and Procedural Guide 06-30, Moderate Internet accessible "Managing Enterprise Risk". systems and All FIPS PUB 199 High. Bo Berlas Changed references to Office Administrative to reflect changes of the Senior Agency in office name and CISO title as a Information Security Officer result of IT and IT Security (OSAISO) and Senior Agency consolidation. Information Security Officer 2 Numerous (SAISO) to Office of the Chief Information Security Officer (OCISO) and Chief Information Security Officer (CISO) Blanche Heard Updated to reflect references Organization titles and 3 to comply with ADM O responsibilities Numerous 5440.667 Revision 3 – December 1, 2015 Bo Berlas Updated Reporting Template Updated to reflect changes to 1 and associated references NIST SP 800-53 Rev 4 and reflect Pages 9 and 20 process updates William Updated Reporting Template, Reflect changes to OWASP, NIST Salamon Rules of Engagement SP 800-15 recommendations, Pages 11-12, 16- 2 Template, and updated incorporate cloud computing 17, 21-22 several sections concepts, and other process updates Revision 4 – January 18, 2018 Dean/Feliksa/ Revised to reflect current Revised to reflect how GSA Klemens/ GSA processes and conducts penetration tests based Newsome procedures for conducting on Federal policies, NIST controls 1 penetration tests. with GSA parameters, and GSA Throughout processes and procedures. Updated to current guide structure and format. U.S. General Services Administration CIO-IT Security-11-51, Revision 4 Conducting Penetration Test Exercises APPROVAL IT Security Procedural Guide: Conducting Penetration Test Exercises, CIO-IT Security-11-51, Revision 4, is hereby approved for distribution. 1/18/2018 X Kurt Garbars Kurt Garbars CISO Signed by: KURT GARBARS Contact: GSA Office of the Chief Information Security Officer (OCISO), Policy and Compliance Division, at [email protected]. U.S. General Services Administration CIO-IT Security-11-51, Revision 4 Conducting Penetration Test Exercises Table of Contents 1 Introduction ...............................................................................................................................1 1.1 Purpose ......................................................................................................................................... 1 1.2 Scope ............................................................................................................................................ 1 1.3 Policy ............................................................................................................................................. 2 1.4 References .................................................................................................................................... 2 2 Penetration Testing Overview .....................................................................................................2 2.1 Penetration Testing Approaches .................................................................................................. 4 2.2 Defining the Scope and Test Boundary ........................................................................................ 5 2.3 Threat Modeling ........................................................................................................................... 5 2.4 Exploiting Vulnerabilities .............................................................................................................. 6 3 GSA Penetration Testing Process .................................................................................................6 3.1 Planning Phase .............................................................................................................................. 7 3.2 Defining the Rules of Engagement ............................................................................................... 8 3.3 Penetration Testing Authorization ............................................................................................... 9 3.4 Test Phases ................................................................................................................................... 9 3.5 Additional Considerations .......................................................................................................... 11 4 Incident Response Procedures .................................................................................................. 11 5 Points of Contact ...................................................................................................................... 11 Appendix A: Penetration Test Rules of Engagement Template ........................................................... 12 Appendix B: Authorization Memorandum Template ......................................................................... 13 Appendix C: Penetration Test Findings Template .............................................................................. 14 Appendix D: Penetration Test Report Template ................................................................................ 15 Appendix E: Penetration Test Tools .................................................................................................. 16 Table of Figures and Tables Table 1-1: Impact Risk Rating Calculation Table ......................................................................................... 5 U.S. General Services Administration i CIO-IT Security-11-51, Revision 4 Conducting Penetration Test Exercises 1 Introduction A penetration test is an authorized simulation of a cyber attack which is used to identify security weaknesses by way of technical flaws, misconfigurations, software vulnerabilities, and/or business logic. A penetration tester will attempt to exploit weaknesses to gain access, modify functionality, and/or corrupt the business logic of the target system without creating additional risk to the agency or organization. The penetration tester will attempt to perform activities of a malicious agent; however, such activities will be conducted ethically and with the permission of the General Services Administration (GSA) Office of the Chief Information Security Officer (OCISO) Information System Security Officer (ISSO) Support Division (IST) Division prior to execution. Keeping the best interests of the organization/agency in mind, the penetration tester will not introduce new vulnerabilities into the target environment. A penetration test exercise supports the overall security process by identifying security risks and demonstrating exploitability of findings that may not be readily apparent when performing a security review. A penetration test can be performed with or without knowledge of the system, and involves the execution of a scenario and abuse cases that focus on violating technical, administrative, and management controls to gain access to the system or data. Penetration tests can be used to verify and prove scan results that are false positives or false negatives. Penetration tests, as opposed to vulnerability scans, should not have false positive findings since they report only on found vulnerabilities. Penetration tests while capable of verifying or proving a specific false negative finding, are not exhaustive and therefore cannot prove there are no vulnerabilities to a system. The test processes described in this document are used for measuring, evaluating, and testing the security posture of an information system, but test findings should not be used to the exclusion of other security processes (e.g., architecture analyses, configuration checks.) 1.1 Purpose This procedural guide provides guidance for performing penetration test exercises against GSA applications, infrastructure, and systems. It provides GSA associates and contractors with significant security responsibilities as identified in the current GSA Order CIO 2100.1, “GSA Information Technology (IT) Security Policy,” and other IT personnel involved in penetration testing exercises on GSA IT resources, an independent repeatable framework for conducting penetration test activities. 1.2 Scope The requirements outlined within this guide apply to and must be followed by all GSA Federal employees and contractors who are involved in penetration testing of GSA information systems and data. U.S. General Services Administration 1 CIO-IT Security-11-51, Revision 4 Conducting Penetration Test Exercises 1.3 Policy Penetration testing is addressed in CIO 2100.1 as stated in the following paragraphs: Chapter 3, Paragraph 2.b(6): All Internet accessible information systems, and all FIPS 199 High impact information systems are required to complete an