19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

✓ Summary of the vulnerabilities discovered<br />

Chapter 16: Reporting Your Results<br />

✓ Prioritized list of vulnerabilities that need to be addressed<br />

✓ Recommendations and specific steps on how to plug the security holes<br />

found<br />

If it will add value to management or your client (and it often does), you can<br />

add a list of general observations around weak business processes, management’s<br />

support of IT and security, and so on along with recommendations for<br />

addressing each issue.<br />

Most people want the final report to include a summary of the findings — not<br />

everything. The last thing most people want to do is sift through a 5-inch-thick<br />

stack of papers containing technical jargon that means very little to them.<br />

Many consulting firms have been known to charge an arm and a leg for this<br />

very type of report, but that doesn’t make it the right way to report.<br />

Many managers and clients like receiving raw data reports from the security<br />

tools. That way, they can reference the data later if they want but aren’t mired<br />

in hundreds of hard-copy pages of technical gobbledygook. Just make sure<br />

you include the raw data in the Appendix of your report or elsewhere and<br />

refer the reader to it.<br />

Your list of action items in your report might include the following:<br />

✓ Enable Windows security auditing on all servers — especially for logons<br />

and logoffs.<br />

✓ Put a secure lock on the server room’s door.<br />

✓ Harden operating systems based on strong security practices from the<br />

National Vulnerabilities Database (http://nvd.nist.gov), the Center<br />

for Internet Security Benchmarks/Scoring Tools (www.cisecurity.<br />

org), and Network Security For Dummies.<br />

✓ Harden your wireless access points by using the techniques and recommendations<br />

presented in Hacking Wireless Networks For Dummies.<br />

✓ Use a cross-cut paper shredder for the destruction of confidential hardcopy<br />

information.<br />

✓ Require strong PINs or passphrases on all mobile devices and force<br />

users to change them periodically.<br />

✓ Install personal firewall/IPS software on all laptops.<br />

✓ Validate input in all web applications to eliminate cross-site scripting<br />

and SQL injection.<br />

✓ Apply the latest vendor patches to the database server.<br />

323

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!