Once answers to these three questions have
been determined, a security evaluation plan is drawn up
that identifies the systems to be tested, how they should be tested, and
any limitations on that testing. Commonly referred to as a "get out of jail
free card," this is the contractual agreement between the client and
the ethical hackers, who typically write it together. This agreement also
protects the ethical hackers against prosecution, since much of what they do
during the course of an evaluation would be illegal in most countries. The
agreement provides a precise description, usually in the form of
network addresses or modem telephone numbers, of the systems to be
evaluated. Precision on this point is of the utmost
importance, since a minor mistake could lead to the evaluation of the
wrong system at the client’s installation or, in the worst case, the evaluation
of some other organization’s system.
Once the target systems are identified, the
agreement must describe how they should be tested. The best evaluation is done
under a "no-holds-barred" approach. This means that the ethical
hacker can try anything he or she can think of to attempt to gain access to or
disrupt the target system. While this is the most realistic and useful, some
clients balk at this level of testing. Clients have several reasons for this,
the most common of which is that the target systems are "in
production" and interference with their operation could be damaging to the
organization's interests. However, it should be pointed out to such clients
that these very reasons are precisely why a "no-holds-barred" approach
should be employed. An intruder will not be playing by the client's rules. If
the systems are that important to the organization's well-being, they should be
tested as thoroughly as possible. In either case, the client should be made
fully aware of the risks inherent to ethical hacker evaluations. These risks
include alarmed staff and unintentional system crashes, degraded network or
system performance, denial of service, and log-file size explosions.
Some clients insist that as soon as the
ethical hackers gain access to their network or to one of their systems, the
evaluation should halt and the client be notified. This sort of ruling should
be discouraged, because it prevents the client from learning all that the
ethical hackers might discover about their systems. It can also lead to the
client's having a false sense of security by thinking that the first security
hole found is the only one present. The evaluation should be allowed to
proceed, since where there is one exposure there are probably others. The
timing of the evaluations may also be important to the client. The client may
wish to avoid affecting systems and networks during regular working hours.
While this restriction is not recommended, it reduces the accuracy of the
evaluation only somewhat, since most intruders do their work outside of the
local regular working hours. However, attacks done during regular working hours
may be more easily hidden. Alerts from intrusion detection systems may even be
disabled or less carefully monitored during the day. Whatever timing is agreed
to, the client should provide contacts within the organization who can respond
to calls from the ethical hackers if a system or network appears to have been
adversely affected by the evaluation or if an extremely dangerous vulnerability
is found that should be immediately corrected.
It is common for potential clients to delay
the evaluation of their systems until only a few weeks or days before the
systems need to go on-line. Such last-minute evaluations are of little use,
since implementations of corrections for discovered security problems might
take more time than is available and may introduce new system problems.
In order for the client to receive a valid evaluation, the client must be
cautioned to limit prior knowledge of the test as much as possible. Otherwise,
the ethical hackers might encounter the electronic equivalent of the client's
employees running ahead of them, locking doors and windows. By limiting the
number of people at the target organization who know of the impending evaluation,
the likelihood that the evaluation will reflect the organization's actual
security posture is increased. A related issue that the client must be prepared
to address is the relationship of the ethical hackers to the target
organization's employees. Employees may view this "surprise
inspection" as a threat to their jobs, so the organization's management
team must be prepared to take steps to reassure them.
No comments:
Post a Comment