Page 36 - info_oct_2021_draft13
P. 36
In Focus Comprehensive Security Detecting Web Infra
AVART Web Shells
Assessment Vulnerabilities
Comprehensive Security
Assessment
A proactive granular approach for
enhancing security
Comprehensive security assessment follows a steps clearly laid out in the test plan. It should
Comprehensive security layered approach, wherein it covers the assess- also include layered deliverables with delivera-
assessment follows a layered ment of all the in-line infrastructure components bles in each assessment step. The Components
(network devices, security devices, Server envi-
included in CSA scope are:
approach, wherein it covers the ronments and Mobile/web applications/APIs) to
ensure that all areas of threats, vulnerabilities All the below processes are taken up continu-
assessment of all the in-line and risks are identified and reported. ously in iterative mode till all the raised vulnera-
The CSA approach includes five key verticals ble issues are not mitigated. The CSA process pro-
infrastructure components that should be executed to assess the respective vides granular Security compliance assessment
Project portal strengths and weakness. mechanism that would help us to build a viable
(network devices, security The outline scope for Security Compliance test- and fool-proof security posture.
devices, Server environments ing process should be properly documented with
and Mobile/web applications/ The Business logic Process
Compliance check mainly involves The External facing Infrastructure
APIs) to ensure that all areas of Access Control checks ( as per ISO Assessment covers Configuration/
27001:2013), Checks for Out-of- Firewall Rules and Vulnerability
threats, vulnerabilities and risks bound processes Being used (like Assessment of in line Perimeter/
OTPs/password changes etc.), API Security Devices being in use by
are identified and reported. and Data Security Controls (Data respective Project portal. The
Privacy, Sensitive Data Handling Public IP Addresses/URLs are also
etc.),Audit Logs Check of complete taken up of Security Compliance
omprehensive Security Assessment (CSA) process workflow. This test also assessment
Audit is to carry out in depth analysis of focuses to ensure that Data
Cexisting Application, Web Infrastructure Security controls are properly in
threats and check for the existing built-in security place or not.
controls in the running Project portal. The CSA
further aims to trace hidden security issues, check
for strong access controls, assessment to prevent
Data breaches and recommends strong measures
for Data Security.
The Internal Infrastructure The Web/Mobile App/API/Web
Vulnerability Assessment of Services being used by the Project
internal Servers, Security and portal are also taken for Security
network devices is also taken for Compliance testing
Security Compliance testing. The Network and
Deployment Architecture
Rajesh Mishra
Scientist-F is reviewed for any
mrajesh@nic.in security gaps
36 informatics.nic.in
36 informatics.nic.in October 2021
October 2021