Checklists a Day: Week in Review – August 31, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

This last week we focused on a series of operational security audit checklists and guides that didn’t follow one particular theme – they were checklists we found that we thought would generally be helpful to everyone. We also decided to give everyone a list of some of the more popular vulnerability assessment engines out there – both commercial and open source. If you’re not using one already, pick one free and one commercial tool – compare the results!

Please feel free to keep the requests coming. We’ll try to oblige as often as we can with new checklists based on your feedback.

Audit Checklists & Security Guides:

Security Update Process

Policy Inventory Checklist

Anti-Virus (Old Link Removed)

Handheld Devices

Data Center Physical Security

Tools for Vulnerability Management:

Tenable Security

eEye Digital Security

Qualys

OpenVAS

Rapid7

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Checklists a Day: Week in Review – August 24, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

This last week we focused back to process controls and operational assurance. We listed checklists to help auditors evaluate an organization’s stance on privacy based issues. We also listed out tools that exist to help an organization to better manage their audit program. Many of this past week’s tools were commercial, but sometimes those can be the best tool for the job.

This upcoming week will focus on additional operational controls, and we’ll through in some choices for vulnerability assessment along the way.

Privacy Audit Checklists & Security Guides:

Privacy Checklist #1

Privacy Checklist #2

Privacy Checklist #3

Privacy Checklist #4

Privacy Checklist #5

Tools for Audit Program Management:  

Archer Technologies

TeamMate

MetricStream

Paisley Enterprise GRC

Pentana Audit Work System (Old Link Removed)

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Twitter, SSL, and SHA-1 – Is Encryption Really Important?

In the information security universe security engineers, managers, curmudgeons and the like daily flock to the Internet to find their news, perform their research, and read about the topic of the day. More and more these same security minded individuals are flocking to social media sites to learn about the day’s daily infosec gossip – myself included. However in this mad rush for information I have to wonder, are we following or concerned about the same security principles that we all preach about in our professional lives?

One of the more popular sites we all visit is still Twitter – the Microblogging service. If we are going to consider this site a part of our research cadre, should we not require the same security standards of it that we do for all of our other applications?

This article is not meant to fully discuss all the social media security issues on the horizon, or even to evaluate Twitter as an appropriate tool. Instead it’s meant to address simply one topic – How does Twitter handle user authentication to their site?

The big issues that have been focused on the last couple weeks have been Twitter.com’s use of SSL (or lack thereof) and TweetDeck’s use of Base64 encoding for passing user credentials. But for today let’s just focus on the mothership – Twiter.com.

The obvious part of this discussion is that Twitter.com does not require SSL when users authenticate to their site. They are certainly not the first site to have this issue, and many of us were willing for years to authenticate to sites like eBay or others without using SSL. Not that it was right, but it was a reality. So when we authenticate to Twitter our credentials are being passed outside of an encrypted tunnel. But are they being sent in clear text as many have suggested?

The first thing we need to do in order to answer this question is capture some traffic between the browser and the Twitter website. Laura Chappell has already written a great overview of this here:

Twitter Twace Analysis Report (PDF; 2 pgs)
TweetDeck Twace Analysis Report (PDF; 13 pgs)
Twitter Trace Files (ZIP 1MB)

Update: Unfortunately the last time we looked, Lara’s site was down. Let’s cross our fingers that they come back online soon and that the above links reactivate!

The next step is to look into specifically the portion of the web transaction dealing with authentication. To make things simple we can use WebScarab from OWASP to intercept the information. What it turns out is that during authentication we see cookies set and credentials sent to the website. Here is a decoded sample:

lang=en, auth_token=, _twitter_sess=BAh7CzoTcGFzc3dvcmRfdG9rZW4iLTUwOGFmZjNhNzg1NTczMT

ZhOGEzZjY2YWZlMjgxOGQxZTA0ZmU5MmE6CXVzZXJpBD09+QM6DGNzcmZfaWQiJTgxODVl

NjZmYzBjZTc3NDhmMjFhNzBmYWUyZGI4OTk2Og5yZXR1cm5fdG8wIgpmbGFz

aElDOidBY3Rpb25Db250cm9sbGVyOjpGbGFzaDo6Rmxhc2hIYXNoewAGOgpA

dXNlZHsAOgdpZCIlZmM0N2RkMTJmYTViNGQ5NTk0MDY5MWMxNmMxMjUzNWE=

–a62476dde49ef8df0fbda6be783d00618633253f

If we look at this sample what we notice right away is at the end of the capture is a 40 character series of letters and numbers which looks a lot like a hash of some sort. Knowing that the characters following the double dashes are 40 characters long, and that SHA-1 generates 40 character hash strings, and that SHA-1 is one of the most popular hashing protocols being used right now, let’s assume they’re using a SHA-1 hash for this algorithm.

Guessing that they’re using SHA-1, and since we know the password that was used to create the original hash, we can next determine if the SHA-1 in use is using a salt value with it. It turns out if we place the original password for the account in a hash generator, it does not equal the hash we have here. That would seem to indicate that they’re using a salted (or HMAC) with the original password to help protect the data being hashed (that’s a good thing).

So while the threat of someone cracking the hash has been minimized, this still doesn’t remove the possibility of a replay attack against Twitter’s authentication scheme. Although I haven’t tried this, it appears that there is a possibility that an unscrupulous individual could capture data such as this, modify an HTTP request with this hash in the header, and attempt to authenticate using someone else’s account. Why does this work? Because the site is not using SSL to protect the hash.

So what information do we have that makes this possible:

1. The Twitter username is sent in clear text in the HTTP body. But really, even if it wasn’t we all advertise our handles anyways (I’m @jamestarala and @isaudit, remember).

2. The Twitter authentication credentials are not being sent in an SSL tunnel.

3. The Twitter hash is clearly visible in the HTTP requests. Although the password is hashed, the hash is sent in the clear.

So why do I bring all this up? Well, for a few reasons, let’s summarize:

1. We should all be critically asking questions like this for the applications we’re using. Especially security practitioners.

2. Auditors should consider using processes like this more to evaluate the application systems they’re evaluating. Authentication is hugely important, let’s not let application developers, system analysts, or vendors off the hook.

3. We want to encourage vendors and service providers (like Twitter) to be aware of the risk levels they’re accepting on our behalf.

The bottom line is that these are risk decisions that we’re making on a daily basis. Let’s make sure we have all the information before we make these decisions. Will I stop using Twitter, likely not, but I will certainly be aware of my surroundings when I choose to do so. Life is risky, at least now I feel I can make an intelligent choice about the risk I’m taking in this one case.

Checklists a Day: Week in Review – August 17, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

We kept the technology focus last week and decided to post links to checklists and security guides that we thought would help people with their audits of Microsoft Windows systems. This may or may not be related to my migration to Windows 7 this week personally. What can I say though, I just can’t help myself sometimes. So enjoy your Windows audits. This coming week we’ll go back to some process controls. Enjoy the privacy checklists this week…

Microsoft Windows Audit Checklists & Security Guides:

General Windows Security

Microsoft Windows Vista

Microsoft Windows Server 2008

Microsoft Windows Server 2003

DISA Checklists for Windows

Microsoft Windows XP

Microsoft Windows Audit Tools:

Microsoft Baseline Security Analyzer

WinAudit

WinFingerprint (Link no longer available)

BelSecure

DISA Gold Disks (Old Link Removed)

Quest Reporter

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

IIA Reiterates Position on Outsourcing Internal Auditing – My Take

The Institute of Internal Auditors (IIA) re-released an interesting position paper this week regarding the role of internal versus external auditors and auditor independence. It’s definitely an interesting read and an issue you should be aware of if you haven’t thought about the issue already. The issue centers around what the role of the internal auditor should be and how they can maintain independence and thus provide worthwhile feedback to an organization.

The question comes up, should organizations outsource their internal audit function? From reading the title of the release one would be led to believe that this is the case. However I’m not sure that’s really what they’re trying to get across. It seems to be the discussion is not about should you outsource this business function or not, but rather how do we ensure that auditors maintain their independence as they perform their audits.

If the same organization that’s handling your external audits is also performing your internal audits – bingo, we have a conflict of interests. External auditors should be there to oversee the work of the internal auditors to ensure correct reporting to the Board of Directors. This shouldn’t be just another checkbox for some compliance purpose we’re trying to meet.

So my hat’s off to the IIA for reposting this. It’s an important issue. Auditors need to be able to be independent. Don’t get extreme, they’re not bashing outsourcers. But their emphasis on the separation of duties between internal and external auditors is a good one to remember. Chew on that. 

Here’s the full article if you haven’t seen it yet:

  (Old Link Removed)

Think about it today and your company’s position on this. Makes for some good watercooler talk today.

Update: Unfortunately this article has since been removed from the IIA’s site. But it’s still a good point for discussion if you have a chance to review the content.

SANS Webcast on the 20 Critical Security Controls – Aug 13th at 1pm ET

I’ll be presenting a webcast for the SANS Institute, along with Alan Paller and Eric Cole on the 20 Critical Security Controls. There’s been a lot of news on these controls in the past few months and a lot of discussion on how they interact with FISMA and NIST guidance for information security. This webcast is meant to talk about the latest developments with these controls and give some real life examples of how these controls are being used by organizations today to thwart some of the cyber-attacks that have been taking place.

If you have a few minutes to listen, I think it will be worth it – plus you can’t beat the price (free). Here’s the link to register, you’ll want to make sure you’re signed up in advance to make sure you get a spot: 

https://www.sans.org/webcasts/show.php?webcastid=92748

There will be Questions & Answers after the webcast. If you want to get your questions to the top of the pile, send it to my Twitter account at @jamestarala.

The Auditor and the PMBOK: Re-examining the Audit Process

Traditional Audit Processes

In most studies that one would read espousing one particular view of the audit process or another, there are varying degrees of similarity between the processes. Many organizations and writers have developed processes that they believe information assurance auditors should follow when performing a formal audit of an organization’s information assets. Whether it is the process defined by industry groups[1] or varying universities[2] publishing their standards there are certain similarities that one will find. These standards tend to be stand-alone processes, event driven, and typically independent of processes that organizations have already standardized on to complete projects in the enterprise. Rather than work with pre-existing models and proven processes for project development, most audit processes tend to be isolated from an organization’s Project Management Office (PMO) and other enterprise level facilities.

What is the PMBOK?

Enter the PMBOK. To cure the disconnect between multiple project management models vying for an organization’s attention in 1981 the Project Management Institute (PMI) commissioned a standard by which organizations could standardize on how to manage their projects, taking advantage of their industry neutral experience in the area. Therefore whether the organization was public or private, small or large, and regardless of the industry sector the organization could utilize a common standard of practice for all of the projects in their portfolio.

In their own words, the PMI states that, The “Project Management Body of Knowledge” (PMBOK®) is an inclusive term that describes the sum of knowledge within the profession of project management. This full body of knowledge includes knowledge of proven, traditional practices, which are widely applied, as well as knowledge of innovative and advanced practices, which may have seen more limited use.”[3]

Therefore by establishing one common body of knowledge an organization can rely upon proven industry standards for project management and focus their resources on implementing a project (in this case an audit), rather than reinventing a process that has proven itself to be effective. By relying on industry standards this again allows the organization to focus on their core business objectives, rather than be distracted by the development of yet another independent standard.

Towards a Unified Model

One common ailment that faces most organizations, however, is the problem of resource constraints more specifically, most organizations simply do not have the manpower to complete all of the tasks that they would like. Time and personnel resources are at a premium in all organizations and the prioritization of such resources is a critical factor by which the success of the management of the organization is often measured. In that vein then, why is it that organizations feel the need to develop and maintain their own processes for auditing their information assets, when instead those resources could be dedicated to performing the task itself?

The premise of this discussion therefore, is to put away competing standards for auditing an organization’s information systems and to rely upon a proven standard for project management. If the PMBOK truly is an industry vertical neutral platform, could it therefore be utilized by auditors to manage their projects? The bias of this discussion is that the answer to this question is yes and that auditors should capitalize on ongoing, relevant research that is already available in order to form a common foundation for basing their work. But before the auditor can take advantage of the pre-existing standards of the PMBOK, an understanding of its basic tenets is first required.

PMI’s PMBOK Basic Process Groups

The five basic process groups that the PMBOK recognizes as crucial to the development of any project are the following:

  1. Initiating
  2. Planning
  3. Executing
  4. Controlling
  5. Closing

Along with these five basic process groups, the PMBOK also recognizes that there are nine knowledge areas that must also be considered as a part of this project development process. These nine knowledge areas influence the project’s direction and guides the decision making process for all key stakeholders involved in the project. The nine knowledge areas are:

  1. Integration Management
  2. Scope Management
  3. Time Management
  4. Cost Management
  5. Quality Management
  6. Human Resource Management
  7. Communications Management
  8. Risk Management
  9. Procurement Management

While these knowledge areas are beyond the current scope of this article, they certainly serve to lend guidance to anyone contemplating a project management centric view of information security auditing. Each of these knowledge areas is useful especially in further developing a project’s plan and in understanding each of the different phases of the project.

Where do we go from here?

In light of these considerations, what practical outcome should an auditor consider that will affect the method by which audits are actually performed? How does this premise of melding the PMBOK and the audit process actually flesh itself out? The answer should be in the form of a well defined audit process, described in industry standard terms (as defined by the PMBOK) that could be applied regardless the type of audit that is being performed. From this an organization could create project templates, timelines, even Gantt charts that could serve as a model for how audits are performed in a common, standardized manner. And now, with a common set of practices in hand, auditors could focus on their core business tasks of evaluating systems rather than on developing frameworks.

But that will have to be the topic for another article.

1. AuditNet’s Audit Process )  (Old Link Removed); SecurityFocus’s Audit Process (http://www.securityfocus.com/infocus/1697); Microsoft’s Audit Process (http://www.microsoft.com/technet/community/columns/sectip/st0606.mspx); are just a few samples.
2. Boston University’s Internal Audit Process ); University of Indiana’s Internal Audit Process (http://www.indiana.edu/~iuaudit/process.html)  (Old Link Removed); Cornell University’s Internal Audit Process ) are just a few samples.
3. The Project Management Institute (http://www.pmi.org)

Checklists a Day: Week in Review – August 10, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well.

So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

So, from all the folks at Enclave Security, enjoy this week’s audit checklists and tools. This week we focused on firewall auditing. So all the checklists and tools are firewall focused this week.

Firewall Audit Checklists & Security Guides:

From University of North Carolina (UNC Cause)

From NIST

From Lance Spitzner

From the Center for Internet Security (Old Link Removed)

From the SANS Institute

Firewall Audit Tools:

Nmap v.5.0

Athena FirePac

Skybox Firewall Auditor

ManageEngine Device Expert

Hping

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.

Free CISA Exam Prep Resources for the Upcoming Exam

I know a lot of you are diligently preparing for the CISA exam this weekend. For those of you who aren’t or you’ve never heard of the exam, read more about it here – www.isaca.org/cisa/.

Why should you care about this cert? Well, basically if you want to enter the audit field or if you’re an auditor and ever think you’ll want to change companies, you’ll need to have this cert. Not only did SC magazine name it to be their top infosec cert of the year, it’s also pretty well considered the entry ticket into the IS audit profession.

Ok, let’s get back to that free part…

So last night I recorded a two hour presentation on what to do this week to get ready for the exam. If you’re not already signed up for the exam, forget it, but you can try again in December later this year. The purpose of the presentation is to focus your studies the week before the exam. We try to give you a practical set of tips on areas you should be focusing on, what to do logistically to prepare, and general strategies for success.

If you want more information or want to be able to listen, you’ll have to register for it, but the best thing to do is visit this link (https://www.sans.org/registration/register.php?conferenceid=19554), register for the presentation, and enjoy the content. You’ll need to use the discount code (Review) to get it for free after you register.

Or on the other hand, just send me a tweet and ask what to do at either @jamestarala or @isaudit. Either way…
Enjoy, and good luck on the exam this weekend!

Checklists a Day: Week in Review – June 6, 2009

Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well.

So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

So, from all the folks at Enclave Security, enjoy this week’s audit checklists and tools.

Audit Checklists & Security Guides:

Auditing Public Companies (Old Link Removed)

Auditing Phone Systems

Auditing the Software Development Lifecycle (SDLC)

Auditing Access Controls (Old Link Removed)

Auditing Home Wireless Networks

Auditing Wireless Networks

Auditing Boundary Security (Old Link Removed)

Audit Tools:

Archer SmartSuite

(Audit Management Software)

WarVOX

(Phone System Audit Software)

W3AF

(Web Application Vulneraility Assessment Software)

LC6

(Password Auditing Software)

Kismac

(Wireless Auditing Software)

Vistumbler

(Wireless Auditing Software)

Nagios

(Network Management Software)

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.