Handle With Care:
You Have My VA Report!
OWASP
Boston Application Security Conference
October 2016
Nivedita Murthy,
Cigital Security Consultant
• 7+ years of AppSec and InfoSec experience.
• My area of expertise: vulnerability remediation.
• Connect with me on LinkedIn.
Who are you?
• Organization using application software?
• Product company delivering a software product?
Today, we will create a guideline that organizations
can follow while reaching a consensus in terms of the
application assessments and findings.
Report Structure
OWASP Guidelines on Reporting
Report Structure: Project Objectives
• Who did the security assessment?
• Assessor details help organizations determine assessment
quality.
Gartner Magic Quadrant
• What assessment was done?
• DAST? SAST? Architecture Review? Threat Modeling?
• Was it automated or manually conducted?
• It depends.
• Automated scan report may be sufficient.
• If it is an application used throughout the enterprise or
involves sensitive information, manual review should follow-
up the automated testing.
Report Structure: Project Schedule
• When was the last assessment conducted?
• You can’t rely on a 5-year-old assessment.
• Valid report should be no older than a year.
• What’s the duration of the assessment?
• If it was only two days, did it cover all functionalities (depends
on the size of the application)?
• It’s important to compare the application size and findings to
determine if the assessment duration is sufficient.
Report Structure: Targets
• What was the scope of the assessment?
• It should list all domains, functionalities, modules, URLs, and
port numbers that were involved in the assessment.
• Did the assessment include application server and
database testing?
• What about outbound streams and APIs connecting to the
application?
• It’s important to know where data is stored and if the
database and server are vulnerable.
• What’s the version?
Report Structure: Limitations
• Are there any modules, domains, and functionalities
that weren’t part of the assessment’s scope?
• Due to time constraints, limited application
availability, and access issues, were some modules
not tested?
Report Structure: Findings Summary
A summary of critical, high, medium, and low vulnerabilities
often gives executives insight into where to focus the security
budget. It doesn’t exactly comfort an organization to know the
possible ways they may be attacked.
• What are the good points?
• What flaws weren’t discovered?
• What if you’re from a product company?
• Include vulnerability title and description, risk level, module
(without giving details on exact parameters and fields) in
your report.
• To hide the details, mask it or delete it.
Report Structure: Appendix
• What methodology was used for testing?
• List the tools and scripts used for testing.
• Were SAST and/or DAST tools used to run automated checks?
• Did the assessor follow a specific checklist?
• Which attacks were checked?
• These questions help determine if the assessment meets the
organization’s standards.
• What was the risk rating model used during the
assessment?
• STRIDE? DREAD? CVSS? NIST 800-30 r1?
• The matrix should be listed. This gives insight into how risk
levels were calculated.
Report Structure: Remediation Plan
• How will the discovered vulnerabilities be resolved?
• The higher the criticality, the faster they need to be resolved.
• Identify who will resolve the issues.
• What is the remediation timeline?
• Provide a description on how the vulnerabilities will be resolved.
• Will they be applying framework-level controls?
• Will they be conducting spot fixes?
• Is the remediation relevant with current standards?
Report Sharing Methodologies
Report Sharing Methodologies
• Password-protected PDF over secure mail.
• Password needs to be sent securely within a separate piece of
mail.
• It’s up to the organization how to share the report internally.
• This reduces distribution overhead from the product
company’s perspective.
• Alternatively, the product company has no visibility into how
many people with whom the report was shared.
Report Sharing Methodologies
• Online hosting.
• Host the report in a file hosting or storage site.
• Allows for limited viewing (no download) access to other
members of the organization.
• The product company has full control over who can view the
report and keep logs regarding when it was accessed, from
where, and by whom.
• The product company has to maintain an externally-facing
document sharing portal.
• Ensuring availability.
• Access approval.
Report Sharing Methodologies
• On-site visit.
• The actual report will never be available to clients at their
discretion.
• The product company has to bear the expenses of having an
organizational representative on-site to physically read it.
2 additional points to
consider when assessment
information is shared.
1. Remediation and Re-testing
• The vendor may have committed dates by which they aim to
resolve the identified vulnerabilities.
• Re-test needs to be conducted to ensure that these
vulnerabilities have in fact been resolved.
• This requires a follow-up on the part of the organization.
2. Secure Development Practices
• Vulnerabilities get resolved.
• The organization needs to determine if there are steps or
procedures in place to ensure that new issues don’t crop up in
future releases.
• Check if vendor developers are trained in secure development
practices.
• Check if they have any internal security testing practices.
Additional Resources
• Overcoming the 6 Most Common Threat Modeling
Misconceptions
• How to Build Security Into Your Software
Development Process
• Top 6 Application Security Hurdles and the Secret
to Overcoming Them
For more information, visit
www.Cigital.com

More Related Content

PPT
5 Models for Enterprise Software Security Management Teams
PDF
Get Your Board to Say "Yes" to a BSIMM Assessment
PPTX
6 Most Common Threat Modeling Misconceptions
PPTX
How to Choose the Right Security Training for You
PPTX
Web Application Security Strategy
PPTX
Software Security Metrics
PPT
Audit Practice at CipherTechs
PDF
7 Lessons Learned From BSIMM
5 Models for Enterprise Software Security Management Teams
Get Your Board to Say "Yes" to a BSIMM Assessment
6 Most Common Threat Modeling Misconceptions
How to Choose the Right Security Training for You
Web Application Security Strategy
Software Security Metrics
Audit Practice at CipherTechs
7 Lessons Learned From BSIMM

What's hot (20)

PDF
Its Not You Its Me MSSP Couples Counseling
PPTX
Effective Vulnerability Management
PDF
Many products-no-security (1)
PPTX
Vulnerability Assessment & Analysis (VAA) Overview
PDF
Implementing Vulnerability Management
PDF
Patch and Vulnerability Management
PPTX
Enterprise Class Vulnerability Management Like A Boss
PPTX
Patch Management: 4 Best Practices and More for Today's Healthcare IT
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PDF
Designing NextGen Threat Identification Solutions
PPTX
Assess all the things
PPT
Security Outsourcing - Couples Counseling - Atif Ghauri
PDF
10 Steps to Building an Effective Vulnerability Management Program
PDF
Infosec 2014 - Considerations when choosing an MSSP
PPTX
BStriker crowdfunder deck
PPTX
Web Application Vulnerability Management
PPTX
New Business Models in Behavioral Health IT
PDF
Most effective QA & testing types
PDF
SanerNow a platform for Endpoint security and systems Management
PPTX
U08784 part 2 presentation
Its Not You Its Me MSSP Couples Counseling
Effective Vulnerability Management
Many products-no-security (1)
Vulnerability Assessment & Analysis (VAA) Overview
Implementing Vulnerability Management
Patch and Vulnerability Management
Enterprise Class Vulnerability Management Like A Boss
Patch Management: 4 Best Practices and More for Today's Healthcare IT
Vulnerability Management: What You Need to Know to Prioritize Risk
Designing NextGen Threat Identification Solutions
Assess all the things
Security Outsourcing - Couples Counseling - Atif Ghauri
10 Steps to Building an Effective Vulnerability Management Program
Infosec 2014 - Considerations when choosing an MSSP
BStriker crowdfunder deck
Web Application Vulnerability Management
New Business Models in Behavioral Health IT
Most effective QA & testing types
SanerNow a platform for Endpoint security and systems Management
U08784 part 2 presentation
Ad

Viewers also liked (20)

PPTX
Peritraumatic Dissociation in Labour: Is it a sentinel signal of mothers at r...
PPTX
Expert system 55102011008
PPTX
Pre-Birth Risk Assessment
PPTX
Supporting children and families returning home from care: Counting the costs
PPTX
An Evaluation of Practice within the Northern Ireland Guardian ad Litem Agenc...
DOCX
Estadística, Chat, Bolivia, Medicina, Estética, Salud, CEPI, Estudios, Posgra...
PPT
Stop it Now
PDF
TV Remote controls for older adults
PDF
All About Mobile App Remarketing
PPT
Sistem interkoneksi dan bus
PDF
Brazendale 2014 - Wasting Our Time_Allocated versus accumulated PA in ASPs
PPTX
Implementing policies on violence against children across Europe - symposium ...
DOCX
Epistemología, Bolivia, Belleza, Carnaval, White Skin
DOCX
Estadística, Chat, Bolivia, Medicina, Estética, Salud, CEPI, Estudios, Posgrado
PDF
Corporate Wellness Magazine - Media Kit
PDF
IJES manuscript_FINAL
DOCX
Resume Venkatesh
DOCX
Rahul kumar
PPTX
Contemporary Management of Dental Neglect
PDF
What are the Basics of Mobile-First Marketing?
Peritraumatic Dissociation in Labour: Is it a sentinel signal of mothers at r...
Expert system 55102011008
Pre-Birth Risk Assessment
Supporting children and families returning home from care: Counting the costs
An Evaluation of Practice within the Northern Ireland Guardian ad Litem Agenc...
Estadística, Chat, Bolivia, Medicina, Estética, Salud, CEPI, Estudios, Posgra...
Stop it Now
TV Remote controls for older adults
All About Mobile App Remarketing
Sistem interkoneksi dan bus
Brazendale 2014 - Wasting Our Time_Allocated versus accumulated PA in ASPs
Implementing policies on violence against children across Europe - symposium ...
Epistemología, Bolivia, Belleza, Carnaval, White Skin
Estadística, Chat, Bolivia, Medicina, Estética, Salud, CEPI, Estudios, Posgrado
Corporate Wellness Magazine - Media Kit
IJES manuscript_FINAL
Resume Venkatesh
Rahul kumar
Contemporary Management of Dental Neglect
What are the Basics of Mobile-First Marketing?
Ad

Similar to Handle With Care: You Have My VA Report! (20)

PPTX
5 Ways to Reduce 3rd Party Developer Risk
PDF
Vulnerability Management: A Comprehensive Overview
PPTX
PPTX
Vapt life cycle
PDF
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
PPT
Introduction_to_Security_Assessments.ppt
PPT
Security_Updates_cybersecuirty ppt presentation.ppt
PDF
Web Application Penetration Tests - Reporting
PDF
ProActive Security
PDF
ProActive Security
PDF
What to Expect During a Vulnerability Assessment and Penetration Test
PPT
Security Overview - Updates and Trends In Detail
PPTX
Reduce Third Party Developer Risks
PDF
ByteCode pentest report example
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
PDF
Application Security - Your Success Depends on it
PPTX
Vulnerability Assessment
PDF
Олексій Барановський “Vulnerability assessment as part software testing process”
PPT
Software Security in the Real World
5 Ways to Reduce 3rd Party Developer Risk
Vulnerability Management: A Comprehensive Overview
Vapt life cycle
Matteo Meucci Software Security in practice - Aiea torino - 30-10-2015
Introduction_to_Security_Assessments.ppt
Security_Updates_cybersecuirty ppt presentation.ppt
Web Application Penetration Tests - Reporting
ProActive Security
ProActive Security
What to Expect During a Vulnerability Assessment and Penetration Test
Security Overview - Updates and Trends In Detail
Reduce Third Party Developer Risks
ByteCode pentest report example
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Application Security - Your Success Depends on it
Vulnerability Assessment
Олексій Барановський “Vulnerability assessment as part software testing process”
Software Security in the Real World

More from Cigital (14)

PPTX
Secure Design: Threat Modeling
PDF
Getting Executive Support for a Software Security Program
PPTX
Can You Really Automate Yourself Secure
PPTX
Video Game Security
PPTX
Software Security Initiative Capabilities: Where Do I Begin?
PPTX
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
PPTX
Cyber War, Cyber Peace, Stones, and Glass Houses
PDF
The Complete Web Application Security Testing Checklist
PDF
SAST vs. DAST: What’s the Best Method For Application Security Testing?
PDF
The Path to Proactive Application Security
PDF
BSIMM By The Numbers
PPTX
BSIMM: Bringing Science to Software Security
PPTX
BSIMM-V: The Building Security In Maturity Model
PPT
How to Avoid the Top Ten Software Security Flaws
Secure Design: Threat Modeling
Getting Executive Support for a Software Security Program
Can You Really Automate Yourself Secure
Video Game Security
Software Security Initiative Capabilities: Where Do I Begin?
Static Analysis Tools and Frameworks: Overcoming a Dangerous Blind Spot
Cyber War, Cyber Peace, Stones, and Glass Houses
The Complete Web Application Security Testing Checklist
SAST vs. DAST: What’s the Best Method For Application Security Testing?
The Path to Proactive Application Security
BSIMM By The Numbers
BSIMM: Bringing Science to Software Security
BSIMM-V: The Building Security In Maturity Model
How to Avoid the Top Ten Software Security Flaws

Recently uploaded (20)

PDF
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
PPTX
Folder Lock 10.1.9 Crack With Serial Key
PDF
Top 10 Project Management Software for Small Teams in 2025.pdf
PPTX
StacksandQueuesCLASS 12 COMPUTER SCIENCE.pptx
PPTX
ROI from Efficient Content & Campaign Management in the Digital Media Industry
PPTX
Why 2025 Is the Best Year to Hire Software Developers in India
PDF
What Makes a Great Data Visualization Consulting Service.pdf
PPTX
Chapter_05_System Modeling for software engineering
PDF
Crypto Loss And Recovery Guide By Expert Recovery Agency.
PPTX
Independent Consultants’ Biggest Challenges in ERP Projects – and How Apagen ...
PPT
3.Software Design for software engineering
PPTX
Human Computer Interaction lecture Chapter 2.pptx
PPTX
Presentation - Summer Internship at Samatrix.io_template_2.pptx
PDF
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
PPTX
Bandicam Screen Recorder 8.2.1 Build 2529 Crack
PPTX
ESDS_SAP Application Cloud Offerings.pptx
PDF
solman-7.0-ehp1-sp21-incident-management
PPTX
UNIT II: Software design, software .pptx
PPTX
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
PPTX
SAP Business AI_L1 Overview_EXTERNAL.pptx
SOFTWARE ENGINEERING Software Engineering (3rd Edition) by K.K. Aggarwal & Yo...
Folder Lock 10.1.9 Crack With Serial Key
Top 10 Project Management Software for Small Teams in 2025.pdf
StacksandQueuesCLASS 12 COMPUTER SCIENCE.pptx
ROI from Efficient Content & Campaign Management in the Digital Media Industry
Why 2025 Is the Best Year to Hire Software Developers in India
What Makes a Great Data Visualization Consulting Service.pdf
Chapter_05_System Modeling for software engineering
Crypto Loss And Recovery Guide By Expert Recovery Agency.
Independent Consultants’ Biggest Challenges in ERP Projects – and How Apagen ...
3.Software Design for software engineering
Human Computer Interaction lecture Chapter 2.pptx
Presentation - Summer Internship at Samatrix.io_template_2.pptx
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
Bandicam Screen Recorder 8.2.1 Build 2529 Crack
ESDS_SAP Application Cloud Offerings.pptx
solman-7.0-ehp1-sp21-incident-management
UNIT II: Software design, software .pptx
DevOpsDays Halifax 2025 - Building 10x Organizations Using Modern Productivit...
SAP Business AI_L1 Overview_EXTERNAL.pptx

Handle With Care: You Have My VA Report!

  • 1. Handle With Care: You Have My VA Report! OWASP Boston Application Security Conference October 2016
  • 2. Nivedita Murthy, Cigital Security Consultant • 7+ years of AppSec and InfoSec experience. • My area of expertise: vulnerability remediation. • Connect with me on LinkedIn.
  • 3. Who are you? • Organization using application software? • Product company delivering a software product? Today, we will create a guideline that organizations can follow while reaching a consensus in terms of the application assessments and findings.
  • 5. Report Structure: Project Objectives • Who did the security assessment? • Assessor details help organizations determine assessment quality. Gartner Magic Quadrant • What assessment was done? • DAST? SAST? Architecture Review? Threat Modeling? • Was it automated or manually conducted? • It depends. • Automated scan report may be sufficient. • If it is an application used throughout the enterprise or involves sensitive information, manual review should follow- up the automated testing.
  • 6. Report Structure: Project Schedule • When was the last assessment conducted? • You can’t rely on a 5-year-old assessment. • Valid report should be no older than a year. • What’s the duration of the assessment? • If it was only two days, did it cover all functionalities (depends on the size of the application)? • It’s important to compare the application size and findings to determine if the assessment duration is sufficient.
  • 7. Report Structure: Targets • What was the scope of the assessment? • It should list all domains, functionalities, modules, URLs, and port numbers that were involved in the assessment. • Did the assessment include application server and database testing? • What about outbound streams and APIs connecting to the application? • It’s important to know where data is stored and if the database and server are vulnerable. • What’s the version?
  • 8. Report Structure: Limitations • Are there any modules, domains, and functionalities that weren’t part of the assessment’s scope? • Due to time constraints, limited application availability, and access issues, were some modules not tested?
  • 9. Report Structure: Findings Summary A summary of critical, high, medium, and low vulnerabilities often gives executives insight into where to focus the security budget. It doesn’t exactly comfort an organization to know the possible ways they may be attacked. • What are the good points? • What flaws weren’t discovered? • What if you’re from a product company? • Include vulnerability title and description, risk level, module (without giving details on exact parameters and fields) in your report. • To hide the details, mask it or delete it.
  • 10. Report Structure: Appendix • What methodology was used for testing? • List the tools and scripts used for testing. • Were SAST and/or DAST tools used to run automated checks? • Did the assessor follow a specific checklist? • Which attacks were checked? • These questions help determine if the assessment meets the organization’s standards. • What was the risk rating model used during the assessment? • STRIDE? DREAD? CVSS? NIST 800-30 r1? • The matrix should be listed. This gives insight into how risk levels were calculated.
  • 11. Report Structure: Remediation Plan • How will the discovered vulnerabilities be resolved? • The higher the criticality, the faster they need to be resolved. • Identify who will resolve the issues. • What is the remediation timeline? • Provide a description on how the vulnerabilities will be resolved. • Will they be applying framework-level controls? • Will they be conducting spot fixes? • Is the remediation relevant with current standards?
  • 13. Report Sharing Methodologies • Password-protected PDF over secure mail. • Password needs to be sent securely within a separate piece of mail. • It’s up to the organization how to share the report internally. • This reduces distribution overhead from the product company’s perspective. • Alternatively, the product company has no visibility into how many people with whom the report was shared.
  • 14. Report Sharing Methodologies • Online hosting. • Host the report in a file hosting or storage site. • Allows for limited viewing (no download) access to other members of the organization. • The product company has full control over who can view the report and keep logs regarding when it was accessed, from where, and by whom. • The product company has to maintain an externally-facing document sharing portal. • Ensuring availability. • Access approval.
  • 15. Report Sharing Methodologies • On-site visit. • The actual report will never be available to clients at their discretion. • The product company has to bear the expenses of having an organizational representative on-site to physically read it.
  • 16. 2 additional points to consider when assessment information is shared.
  • 17. 1. Remediation and Re-testing • The vendor may have committed dates by which they aim to resolve the identified vulnerabilities. • Re-test needs to be conducted to ensure that these vulnerabilities have in fact been resolved. • This requires a follow-up on the part of the organization.
  • 18. 2. Secure Development Practices • Vulnerabilities get resolved. • The organization needs to determine if there are steps or procedures in place to ensure that new issues don’t crop up in future releases. • Check if vendor developers are trained in secure development practices. • Check if they have any internal security testing practices.
  • 19. Additional Resources • Overcoming the 6 Most Common Threat Modeling Misconceptions • How to Build Security Into Your Software Development Process • Top 6 Application Security Hurdles and the Secret to Overcoming Them
  • 20. For more information, visit www.Cigital.com

Editor's Notes

  • #2: Handle With Care: You Have My VA Report!
  • #3: I’m Nivedita Murthy. I’m a Cigital Security Consultant with 7+ years of application security and information security experience. My area of expertise is vulnerability remediation.
  • #4: Who are you? Organization. Are you an organization looking to buy an application to carry out certain functionalities within your company? Do you know what you should be looking for in an assessment report? How do you deal with these findings? Product Company. Do you belong to an organization that has developed a product which is being used by multiple companies? How can you create a standard report that you can share with all of your clients meeting most of their application security requirements? At the same time ensuring critical, sensitive information does not get shared in the process? Guideline. My aim today is to create a guideline that organizations can follow while reaching a consensus in terms of the application assessments and findings.
  • #5: How should the report be structured? Why? This resource provides a great deal of insight.
  • #6: Project Objectives. Who did the assessment? You can’t just have any Tom, Dick, and Harry come and say that they have done this assessment and accept that as a valid assessment, right? Details of the assessor help organizations determine the quality of assessment (are they leading vendors in carrying out such assessments?). It also helps in the legitimacy and trustworthiness. How do we know such assessors? Here’s how: Gartner Magic Quadrant- http://techbeacon.com/resources/magic-quadrant-application-security-testing-gartner The other important information that you should be looking out for in this section is what kind of assessment was done. Was it a black box/DAST, white box/SAST, architecture review, threat modeling? Was it just manual or fully automated? This would actually depend on what are you using the application for. What is the data confidentiality of the information it will be handling? Is it something that would be used infrequently or once a quarter (e.g., surveys, polls)? In some scenarios, the report from automated scan should suffice. However, if it is an application that is used enterprise-wide and/or deals with sensitive information, a thorough test using automated tools as well manual testing needs to be considered.
  • #7: Project Schedule. When was the last assessment conducted? You really can’t rely on a 5-year-old assessment. It is recommended that the report be no more than a year old considering how frequently we hear of new attack methods and an average release cycle to be six months to one year. However, the answer to this question changes if the product version is significantly higher (2 or more) than the one that was tested. It could be that this product may have had frequent releases (though a rare case). The duration of the assessment also matters. If it is just 2 days, did it cover all functionalities depending on the size of the application? Maybe the assessment was done just to check the top 5 vulnerabilities and not everything (This should ideally been mentioned in the project objectives.) Compare the application size and findings to determine if the assessment duration looks sufficient.
  • #8: Targets. What was marked under scope? It needs to list all domains, functionalities, modules, URLs, and port numbers that were part of the assessment. This helps to determine if the modules and functionalities that your organization heavily relies on were included in the assessment or not. Did it include application server and database testing? Or any of the outbound streams or APIs connecting to the application? If you are making use of third-party hosted Web application to enter employee information, you definitely want to know where the data is being stored and if the database is vulnerable or not. The same goes for the server. Such an assessment would definitely go beyond the scope of a pure application assessment. However, it is imperative from an organization’s standpoint as to where their data is being processed and stored. Some applications also have backend reporting capabilities where certain “usage statistics” are sent back to the host company. How is this connection established and what information is sent? Does it include details on who logged into the application and from where (internal IP addresses is not something you want to disclose)?
  • #9: Limitations. This traditionally includes modules, domains, and functionalities that weren’t part of the assessment’s scope. Organizations should verify if any of these apply to you. While some modules could have been included as part of testing, due to time constraints, limited application availability, and access issues, some of them could not have been tested. This section of the report should lists these limitations.
  • #10: Findings Summary. A summary of critical, high, medium, and low vulnerabilities often gives executives insight into where to focus the security budget. It doesn’t exactly comfort an organization to know the possible ways they may be attacked. What are the good points? What flaws weren’t discovered (e.g., were there no occurrences of SQL Injection and XSS)? Does the critical vulnerability have to do with a hardcoded password or an XSS attack? Where was this found exactly? Is it something that your organization uses heavily? Is it something that can be switched off or disabled by an organization if not being used? Wait a minute. I am from a product company? I can’t share information on where exactly the flaw was found and how… That’s very specific and sensitive information. What do I do? Here is what you should be including in the report: 1) Vulnerability title and description 2) Risk level 3) Which module (without giving details on exact parameters and fields) Two options to hide details: delete it or mask it.
  • #11: Appendix. What methodology was used for testing? This section should lists the tools and scripts used for testing. Were any SAST/DAST tools used to run automated checks? What were they? Did the assessor follow any specific checklist? Which attacks were checked? This gives you great deal of information on what kind of assessment was done and helps you determine if the assessment meets the organizations standards. What was the risk rating model used by the assessing team to determine the risk level of the flaws. STRIDE/DREAD/CVSS/NIST 800-30 r1 ? Or a company standard. The matrix should be listed to give an idea on how the risk levels were calculated. Lets say an SQL injection flaw was listed as a medium severity. However, the organization doesn’t agree on this risk level. The model should help them understand how this was calculated.
  • #12: Remediation Plan. Now that we have discovered the vulnerabilities, the next step is to fix them. The higher the criticality, the faster they should be resolved. Does the product company plan to fix it? Has it been fixed? Check the version of your software against the one that was tested. The vendor should also give a brief description of how it is going to be fixed. Will they be applying framework-level controls rather than doing a spot fixes? (Ensuring possible future occurrences of flaws can be prevented with these controls.) Is the remediation relevant with current standards?
  • #13: This section is more relevant for the vendor than the organization itself.
  • #14: Password-protected PDF over secure mail. The sanitized report can be shared with other organizations by sending the password protected PDF via secure mail. The password needs to be sent securely within a separate piece of mail. It would be at the organization’s discretion as to how they would like to share the report internally. This reduces the overhead of distribution from the product company’s hands. On the other hand, the product company will have no visibility as to how many people with whom the report was shared.
  • #15: Online hosting. The product company can host the report in a file hosting and storage site and give limited (view only, no download) access to other members of that organization. Here, the product company has full control on who can view this report and can keep logs on when was it accessed, from where, and by whom. However, they have to maintain an externally-facing document sharing portal to ensure availability along with the added tasks on approving access.
  • #16: On-site visit. This is the most drastic of all options if you are concerned about the report even after it was sanitized. The only pro in this case is that the actual report will never be available to your clients at their discretion. The disadvantage here is that the product company has to bear out the expenses of getting a representative of the organization visit onsite and read it physically.
  • #17: These are side notes that I am listing out when such assessments are shared. This is typically a sub-set of how vendor assessments are carried out. In addition to the report being shared, an organization needs to check on the following points:
  • #18: Remediation and re-testing. The vendor may have committed dates by which they aim to resolve the identified vulnerabilities. Re-test needs to be conducted to ensure that these vulnerabilities have in fact been resolved. This requires a follow-up on the part of the organization.
  • #19: Secure development practices. The vulnerabilities may get resolved, however the organization needs to determine if there are steps or procedures in place to ensure new issues don’t crop up in future releases. The organization needs to check if the developers of the vendor are being trained in secure development practices. Also, do they have any internal security testing practices to ensure that vulnerabilities are identified and fixed as early as possible.
  • #21: For more information, visit us at www.cigital.com.