From: stevearmstrong@logicallysecure.com
Date: Thu May 18 2006 - 06:37:54 EDT
OSSTMM is a good methodology but I think you may be adding another layer to a problem. If your threat identification process is conducted correctly (with either IS1 or 2) then you will have the key attack vectors identified. Either by using attacking groups from IS1 or by looking at domain based security attack vectors against the data islands (IS2). After this you should be able to identify key area for focused and detailed testing the results of which will allow you to 'put to bed' those vectors.
However, and I may be wrong here, you aren't getting this kind of indicators of areas to test because of the type of output CRAMM generates.
It honestly sounds like your accreditor is all screwed up! And to be honest (speaking as both a former tester and accreditor) you need direction from them as to what kind of output they want for testing. OSSTMM is thorough and will uncover problems with your system (complexity and tester skill permitting), but you cannot just point a team at a network and as 'go do a OSSTMM test on that network/system' as it is too generic.
To satisfy a good accreditor, targeted testing at high risk or vulnerable points is required. If you gave me a OSSTMM test on a network I would accept it but it would only be a starting point for further testing and therefore probably overkill. Without a good process to identify the correct risks, time and effort are being wasted.
Just my 2p
Steve A
-------------------------------------------------
UK IT Security Forum - www.logicallysecure.com/forum
-------------------------------------------------
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:59 EDT