Penetration testing guide

简介: Standards complianceThere are a number of good standards and guidelines in relation to informat...

Standards compliance

There are a number of good standards and guidelines in relation to information security in general, for penetration tests in particular, and for the storage of certain types of data. Any provider chosen should at least have a working knowledge of these standards and would ideally be exceeding their recommendations.

Notable organisations and standards include:

PCI

The Payment Card Industry (PCI) Data Security Requirements were established in December 2004, and apply to all Members, merchants, and service providers that store, process or transmit cardholder data. As well as a requirement to comply with this standard, there is a requirement to independently prove verification.

ISACA

ISACA was established in 1967 and has become a pace-setting global organization for information governance, control, security and audit professionals. Its IS Auditing and IS Control standards are followed by practitioners worldwide and its research pinpoints professional issues challenging its constituents. CISA, the Certified Information Systems Auditor is ISACA's cornerstone certification. Since 1978, the CISA exam has measured excellence in the area of IS auditing, control and security and has grown to be globally recognized and adopted worldwide as a symbol of achievement.

CHECK

The CESG IT Health Check scheme was instigated to ensure that sensitive government networks and those constituting the GSI (Government Secure Intranet) and CNI (Critical National Infrastructure) were secured and tested to a consistent high level. The methodology aims to identify known vulnerabilities in IT systems and networks which may compromise the confidentiality, integrity or availability of information held on that IT system. In the absence of other standards, CHECK has become the de-facto standard for penetration testing in the UK. This is mainly on account of its rigorous certification process. Whilst good it only concentrates on infrastructure testing and not application. However, open source methodologies such as the following are providing viable and comprehensive alternatives, without UK Government association. It must also be noted that CHECK consultants are only required when the assessment is for HMG or related parties, and meets the requirements above. If you want a CHECK test you will need to surrender your penetration testing results to CESG.

OSSTMM

The aim of The Open Source Security Testing Methodology Manual (OSSTMM) is to set forth a standard for Internet security testing. It is intended to form a comprehensive baseline for testing that, if followed, ensures a thorough and comprehensive penetration test has been undertaken. This should enable a client to be certain of the level of technical assessment independently of other organisation concerns, such as the corporate profile of the penetration-testing provider.

OWASP

The Open Web Application Security Project (OWASP) is an Open Source community project developing software tools and knowledge based documentation that helps people secure web applications and web services. It is an open source reference point for system architects, developers, vendors, consumers and security professionals involved in designing, developing, deploying and testing the security of web applications and Web Services.

The key areas of relevance are the forthcoming Guide to Testing Security of Web Applications and Web Services and the testing tools under the development projects. The Guide to Building Secure Web Applications not only covers design principals, but also is a useful document for setting out criteria by which to assess vendors and test systems.

Glossary

Listed below is detailed glossary of penetration testing terminology. Inclusion here does not imply any form of endorsement on the behalf of Corsaire; the link is supplied for your convenience only.

http://www.ee.oulu.fi/research/ouspg/sage/glossary

目录
相关文章
Gbit与GByte比较
这段在看阿里的ECS指标,发现网络带宽的相关指标为Gbit/s,与平常的单位有些不同。先解释下差异并记录。
3743 0
Gbit与GByte比较
|
缓存 网络协议 安全
|
存储 编解码 缓存
鹿班 PICASSO 实时渲染引擎的奥秘,如何支撑每秒千万图像访问?
读者受益: 1、鹿班PICASSO实时合图引擎因何而生 2、实时合图引擎如何支撑每秒千万图像访问 3、实时合图引擎应用场景介绍
1538 0
鹿班 PICASSO 实时渲染引擎的奥秘,如何支撑每秒千万图像访问?
|
网络协议 安全 数据安全/隐私保护
SNMP服务WIN10安装及测试
SNMP 是英文" Simple Network Management Protocol "的缩写,中文意思是" 简单网络管理协议 "。 SNMP是一种简单网络管理协议,它属于TCP/IP五层协议中的应用层协议,用于网络管理的协议 。SNMP主要用于网络设备的管理。由于SNMP协议简单可靠 ,受到了众多厂商的欢迎,成为了目前最为广泛的网管协议。
1644 1
SNMP服务WIN10安装及测试
|
存储 固态存储 安全
阿里云服务器8核32G配置多少钱?我们应该如何选择?
阿里云服务器8核32G配置有多达三十几种实例规格可选,不同实例规格的收费标准不一样,本文介绍了8核32G配置可选实例规格和最新收费标准及活动价格,可供大家了解阿里云服务器8核32G配置多少钱以及选择建议。
阿里云服务器8核32G配置多少钱?我们应该如何选择?
|
人工智能 开发者
Z 检验基本原理 | 学习笔记
快速学习 Z 检验基本原理
Z 检验基本原理 | 学习笔记
|
存储 IDE 开发工具
2021 最新 IntelliJ IDEA 详细配置步骤演示(图文版)(二)
2021 最新 IntelliJ IDEA 详细配置步骤演示(图文版)(二)
926 0
2021 最新 IntelliJ IDEA 详细配置步骤演示(图文版)(二)
|
存储 缓存 小程序
微信小程序图片保存到本地一次问题解决
最近接到一个小程序保存二维码到本地的需求,以保证用户分享进行推广。看看似简单的一个小需求,其实还是挺麻烦的,为大家分享下(这里项目使用了Taro小程序是一样的)。
|
人工智能 自然语言处理 算法
业界总结 | 如何改进双塔模型,才能更好的提升你的算法效果?(一)
业界总结 | 如何改进双塔模型,才能更好的提升你的算法效果?(一)
889 0
业界总结 | 如何改进双塔模型,才能更好的提升你的算法效果?(一)
|
存储 弹性计算 缓存
Tair持久存储系列技术解读
阿里云数据库重磅发布自研Tair持久存储系列的产品打破了传统Redis中的数据只能在易失性存储上进行读写的刻板印象,针对客户不同业务阶段的数据存储要求与服务成本考量,全新实现了持久性更强、成本更低的KV数据库。
9128 0
Tair持久存储系列技术解读