Government Audit Status Update

Government Audit Status Update
Slide Note
Embed
Share

Action plan progress update, current audit status, and utilization of performance measures in a government setting. Includes details on tasks, issues resolution steps, and major outstanding reconciliations. Learn how federal qualifications are assessed and key focus areas for audit completion.

  • Government
  • Audit
  • Progress
  • Performance Measures
  • Reconciliation

Uploaded on Apr 13, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. 60 min OSTMM THE OPEN SOURCE SECURITY TESTING METHODOLOGY MANUAL DAY 02

  2. AGENDA WHAT YOU NEED TO KNOW SECURITY ANALYSIS OPERATIONAL SECURITY METRICS TRUST ANALYSIS THE WORKFLOW 2

  3. WHAT YOU NEED TO KNOW ?

  4. What you need to know ALL ABOUT OPSEC MOVE ASSET AS FAR FROM THREAT AS POSSIBLE NEUTRALISE THREAT (BY INPUT SANITISATION I.E.) DESTROY THE THREAT 100% SECURITY IS POSSIBLE IF WE CAN COVER THAT THE THREAD AND ASSET ARE SEPERATED IN PRACTICE, NEARLY IMPOSSIBLE. 4

  5. What you need to know CONTACT BETWEEN ASSET AND OUTSIDE WORLD SOMETIMES REQUIRED EVERY ENTRY ENTRY POINT INCREASES POROSITY MORE POROSITY = LESS SECURITY A PORE CAN BE VISIBILITY , ACCESS OR TRUST THE ASSETS CAN BE ACCESS THROUGH PORES WITH VARIOUS CONTROLS 5

  6. 12 10 CONTROLS WE LOST 2 ALONG THE WAY

  7. 12 12 10 CONTROLS - INTERACTIVE AUTHENTICATION INDEMNIFICATION A CONTRACT ENFORCEDBETWEEN ASSETANDTHEINTERACTING PARTIES RESILIENCE SUBJUGATION ASSURESINTERACTIONSCAN ONLYOCCURACCORDING TODEFINEDPROCESS CONTINUITY 7

  8. 12 12 10 CONTROLS - INTERACTIVE AUTHENTICATION INDEMNIFICATION A CONTRACT ENFORCEDBETWEEN ASSETANDTHEINTERACTING PARTIES RESILIENCE SUBJUGATION ASSURESINTERACTIONSCAN ONLYOCCURACCORDING TODEFINEDPROCESS CONTINUITY 8

  9. OBJECTIVES VS CONTROLS WHAT TO DO WHEN AND WHY

  10. OBJECTIVES VS CONTROLS 10

  11. LIMITATION LET S ADD ANOTHER LAYER

  12. limitations 12

  13. THE METHODOLOGY BRINGING IT ALL TOGETHER

  14. THE METHODOLOGY FOREVERYCONTACT POINTOFASSETWITH OUTSIDEACTOR ? FOREVERYHOLE ? APPLYAT MAX.10CONTROLS ? TOCOVER4LIMITATIONS ? ANDBRING SECURITYBACK UPTO100% APPLIESTOA SNAPSHOTANDNEEDSTOBE RE-EVALUATED REGULARLY 14

  15. WHAT YOU HAVE TO DO COVERING THE COVERAGE

  16. DEFINE A SECURITY TEst 7 STEPS FOR EVERY SECURITY TEST ? DEFINEYOURASSETS,CONTROLS AND LIMITATIONS ? DEFINEAREAS AROUND THE ASSET,THISISTHE ENGAGEMENTZONE ? DEFINEEVERYTHINGAROUND ENGAGEMENTZONE,THISISSCOPE ? DEFINETHE INTERACTIONOF THESCOPEWITHTHE WORLD, THISIS THE VECTORS ? DEFINEEQUIPMENTREQUIRED,THESEARE THE CHANNELS ? DEFINETESTTYPE ? DEFINERULES OF ENGAGEMENT 16

  17. scope TOTAL POSSIBLE OPERATING SECURITY ENVIRONMENT ? FORANY INTERACTIONWITH ANY ASSET ? MAYINCLUDE THE PHYSICALCOMPONENTSOFSECURITYMEASURESAS WELL. 17

  18. CHANNELS 18

  19. 4 POINT PROCESS INDUCTION(Z) ? UNDERSTANDINGWHERE THE TARGETRESIDESANDFROMWHERE. INQUEST(C) INTERACTION(A/B <>B/A) INTERVENTION(X/Y/Z) 19

  20. TRIFECTA HOWDOCURRENT OPERATIONSWORK? HOWDOTHEYWORK DIFFERENTLYFROMHOWMANAGEMENTTHINKSTHEYWORK? HOWDOTHEYNEEDTOWORK? 20

  21. 21

  22. Test results 1.DATEAND TIMEOFTEST 2.DURATIONOFTEST 3.NAMES OFRESPONSIBLEANALYSTS 4.TESTTYPE 5.SCOPEOFTEST 6.INDEX (METHODOFTARGETENUMERATION) 7.CHANNEL TESTED 8.TESTVECTOR 9.ATTACKSURFACEMETRIC 10.WHICHTESTSHAVEBEENCOMPLETED,NOTCOMPLETED,ORPARTIALLY COMPLETED,AND TOWHATEXTENT 11.ANY ISSUESREGARDINGTHETESTAND THEVALIDITY OFTHERESULTS 12.ANY PROCESSESWHICHINFLUENCETHESECURITYLIMITATIONS 22 13.ANY UNKNOWNS ORANOMALIES

  23. FALLACIES OF TESTING NOTHING IS EVER 100% SECURE ? THIS FAILS TO TAKE TIME AND CONDITIONS INTO REGARD EVEN IF YOU ARE SECURE, IF AN ATTACKER WANTS IN BADLY ENOUGH THEY LL GET IN. ? THIS IMPLIES ATTACKERS DID NOT WANT IT BADLY ENOUGH BESIDES, GET IN IS A VERY BROAD UNDERSTANDING THERE IS NO PERFECT SECURITY. ? THERE CAN BE PERFECT SECURITY FOR THE REQUIREMENTS AS COVERED BY TESTS SECURITY IS A PROCESS NOT A PRODUCT. ? IT CAN BE BOTH AND MORE! 23

  24. METRICS RAV CALC ? POROSITY ? + CONTROLS ? + LIMITATIONS ? ACTUAL SECURITY % ON ITERATIONS, THIS NEEDS TO RISE SEE EXCEL FILE 006 RAV CALC.XLSX 24

More Related Content