The Internal vulnerability assessment and testing (IVAST) is performed with the goal of assessing the security posture of the credit union internal network and systems security controls. Every device within the credit union's network is evaluated for configuration backdoors, trojans, malware, and mis-configuration.
Our experienced professionals will examine the internal information systems for implementation of industry best practices and perform a technical review to verify existing vulnerabilities and configuration errors.
Many Senior Executives and IT departments continue to invest their security budget almost entirely in protecting their networks from external attacks, but businesses need to also secure their networks from malicious employees, contractors, and temporary personnel. These trusted insiders obviously have substantial access to the network as well as a company’s physical premises so it is easy for them to appear hard at work while actually scanning the network for vulnerabilities or checking employee desks for passwords left exposed. An Internal Network Vulnerability Assessment and Testing is needed to reduce the risk of an internally-generated attack as well as an external attack that penetrates beyond your firewalls.
What is an Internal Vulnerability Assessment and Testing (IVAST)?
The Internal Vulnerability Assessment and Testing (IVAST) centers around a testing process that probes your organization’s internal LAN components, including servers, routers, switches, and workstations. This testing is performed from two vantage points. The first is that of an unprivileged guest. The second is that of an authenticated internal user. During the assessment process, Our security professionals simulate techniques used by unauthorized and malicious internal users in an attempt to find network vulnerabilities that could be exploited. The consultant then perform limited testing of advanced security systems (example: intrusion prevention systems) that may already be in place and the potential for their circumvention.
What is the purpose of this test?
The Internal Vulnerability Assessment and Testing (IVAST) determines how secure your network is from malicious (or even unintentional) theft or damage due to un-patched, weak, or misconfigured security settings on your internal infrastructure. The Assessment mimics the beginning phases of attacks from two potential attacker groups - unprivileged guests and trusted internal users.
The first group -unprivileged guests- has no privileges on your network other than connectivity via a standard LAN jack in your office. Possible members of this group would be cleaning crews, other workers, visitors such as customers and vendor personnel, or even hackers who have penetrated your firewall but have not yet gained any network privileges. Depending on your approach to handling contractors and consultants, they could be a member of the first or second group.
The second group -trusted internal users - has standard user privileges on your network. This group may consist of all users, although it is often beneficial to scan from the perspective of multiple security groups (sales, finance, executives, IT, etc.) to determine assess variations in privileges.
What methodologies do we use?
Your Assessment project is assigned to a team of highly experienced and certified security professionals. During the Vulnerability Assessment testing phase, our security professional works on-site at your office location closely interacting with your Information Security Team.
Using a variety of manual and automated tools, both open source, commercial and proprietary, our consultant probes your internal network to identify the in-scope network devices, their operating systems, and the network services they are running. Our Vulnerability Assessment tools currently perform over 2,500 security checks and are continually updated as new attack patterns are identified. To get the best possible results, nothing is taken for granted. These tools are configured and run only by our certified Security professionals who customize each probe based on experience, your organization’s infrastructure and needs, and the results of previous assessments.
The consultant then probes the devices and services for known flaws and common misconfigurations, and compiles a list of the vulnerabilities that are found. The testing is designed to be non-invasive and non-disruptive.
The consultant will detail application and technical security issues and include recommendations to resolve issues. An important task completed during this phase is the validation of vulnerabilities which generally results in the identification and documentation of a small set of false positive results. The deliverable is reviewed by multiple members of the project team. Every project team has at least one Security professional with a minium of Certified Information Systems Security Professional (CISSP) certification.
What is the final result?
Once the Internal Vulnerability Assessment testing, validation, and documentation phases are complete, you receive a complete presentation of the findings, a comprehensive report . This report details the following:
The project lead assigned to your team will review the Vulnerability Assessment report findings so the results are well understood by you and your designated personnel.
Internal Network Vulnerability Assessments frequently include but it is not limited to:
Hackers are breaking the systems for profit. Before, it was about intellectual curiosity and pursuit of knowledge and thrill, and now hacking is big business.
We worried for decades about WMDs – Weapons of Mass Destruction. Now it is time to worry about a new kind of WMDs – Weapons of Mass Disruption.
Intellectuals solve problems; geniuses prevent them.
People who deal with bits should expect to get bitten.
Education is the process of learning more and more about less and less until one knows everything about nothing and is entitled to call oneself 'Doctor'.
Programming can be fun, so can cryptography; however they should not be combined.
Kreitzberg and Shneiderman
Computers don't introduce order anywhere as much as they expose opportunities.
Alan J. Perlis