Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

7/3/2019
01:00 PM
Joshua Goldfarb
Joshua Goldfarb
Commentary
Connect Directly
Twitter
RSS
E-Mail vvv

20 Questions to Ask During a Real (or Manufactured) Security Crisis

There are important lessons to be learned from a crisis, even the ones that are more fiction than fact.

Image Credit: DuMont Television/Rosen Studios. Public domain, via Wikimedia
Image Credit: DuMont Television/Rosen Studios. Public domain, via Wikimedia

Comment  | 
Print  | 
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
7/7/2019 | 7:30:02 PM
Creating a framework to help address some of the questions brought up
NIST has a site where they provide similar questions but they revolve the questions about developing a framework. This framework is based on the Risk Management framework from NIST - Risk Assessment Framework chart.

The questions you bring up are listed in this flowchart, it addresses
  • Page 20 - Identify the threats and their severity
  • Page 24 - Mgmt, Operational, Technical Security
  • Page 31 - Risk Level Matrix with weights
  • Page 34 - Risk Mitigation Strategy
  • Page 39 - Technical Security Controls
  • Page 43 - Preventative Operational Controls
  • Page 46 - Implemented Controls and Residual Risk
  • Page 47 - Evaluation & Assessment (Good Security Practice/Keys to Success)
  • Page 48 - Sample Interview Questions (Acronym)*

* Interview questions that can assist in the assessment and risk mitigation strategy. Sample Questions listed below:
APPENDIX A: Sample Interview Questions Interview questions should be tailored based upon where the IT system assessed is in the SDLC. Sample questions to be asked during interviews with site personnel to gain an understanding of the operational characteristics of an organization may include the following:
  • Who are valid users?
  • What is the mission of the user organization?
  • What is the purpose of the system in relation to the mission?
  • How important is the system to the user organization's mission?
  • What is the system-availability requirement?
  • What information (both incoming and outgoing) is required by the organization?
  • What information is generated by, consumed by, processed on, stored in, and retrieved by the system?
  • How important is the information to the user organization's mission?
  • What are the paths of information flow?
  • What types of information are processed by and stored on the system (e.g., financial, personnel, research and development, medical, command and control)?
  • What is the sensitivity (or classification) level of the information?
  • What information handled by or about the system should not be disclosed and to whom?
  • Where specifically is the information processed and stored?
  • What are the types of information storage?
  • What is the potential impact on the organization if the information is disclosed to unauthorized personnel?
  • What are the requirements for information availability and integrity?
  • What is the effect on the organization's mission if the system or information is not reliable?
  • How much system downtime can the organization tolerate?
  • How does this downtime compare with the mean repair/recovery time?
  • What other processing or communications options can the user access?
  • Could a system or security malfunction or unavailability result in injury or death?

Todd
How Attackers Could Use Azure Apps to Sneak into Microsoft 365
Kelly Sheridan, Staff Editor, Dark Reading,  3/24/2020
Malicious USB Drive Hides Behind Gift Card Lure
Dark Reading Staff 3/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
State of Cybersecurity Incident Response
State of Cybersecurity Incident Response
Data breaches and regulations have forced organizations to pay closer attention to the security incident response function. However, security leaders may be overestimating their ability to detect and respond to security incidents. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10940
PUBLISHED: 2020-03-27
Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.
CVE-2020-10939
PUBLISHED: 2020-03-27
Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.
CVE-2020-6095
PUBLISHED: 2020-03-27
An exploitable denial of service vulnerability exists in the GstRTSPAuth functionality of GStreamer/gst-rtsp-server 1.14.5. A specially crafted RTSP setup request can cause a null pointer deference resulting in denial-of-service. An attacker can send a malicious packet to trigger this vulnerability.
CVE-2020-10817
PUBLISHED: 2020-03-27
The custom-searchable-data-entry-system (aka Custom Searchable Data Entry System) plugin through 1.7.1 for WordPress allows SQL Injection. NOTE: this product is discontinued.
CVE-2020-10952
PUBLISHED: 2020-03-27
GitLab EE/CE 8.11 through 12.9.1 allows blocked users to pull/push docker images.