Penetration Testing mailing list archives
Re: CoBIT a Security Audit Framework?
From: hightch0 () netscape net
Date: Tue, 02 Dec 2008 11:44:10 -0500
Hi. You can try the "IS Auditing Procedure: P08 Security Assessment - Penetration Testing and Vulnerability Analysis" document at the ISACA web page, it describes a process to execute a pentest aligned to CobiT, also you can add some features from OSSTMM or NIST to obtain a more global pentest process. I think you need to obtain the ISACA membership to download the mentioned document (there are some free), however the membership is a good investment because you will have access to a lot of resources that helps in our daily job.
I hope this information helps, regards from Mexico. Jose Luis Aparicio C. CISA, CISM, CGEIT, ISO 27001 PA -----Original Message----- From: J. Oquendo <sil () infiltrated net> To: Jon Kibler <Jon.Kibler () aset com> Cc: pen-test () securityfocus com Sent: Mon, 1 Dec 2008 1:52 pm Subject: Re: CoBIT a Security Audit Framework? On Mon, 01 Dec 2008, Jon Kibler wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, <rant> And what REALLY gets me is that organizations expect you to be able todo a PEN TEST using CoBIT! When I explain that something like OSSTMM
is
a more correct framework for a PEN TEST (or even NIST 800-115 or800-53A), they don't want to hear it -- its gotta be CoBIT! They have
so
many misunderstandings as to what CoBIT is and is not useful for, it
is
incredible -- and they are not interested in learning anything
different.
Who / what is driving this "CoBIT is the only acceptable IT Security audit framework" mentality and what can we do to change it? </rant>
I should have been a little more clear on my initial post so apologies for the second email on this. You're comparing apples and oranges here. ISECOM's OSSTMM framework is great for the penetration tester and for the testing methodologies used, especially for the verification purposes however it is solely a pentesting framework. Your client is probably under- clued with the differences and wants to maintain CoBIT compliance, keeping in tune with the checks and balances of CoBIT's framework. If you have the modules' information, they correlate them for your client on how you will match them up so they can understand the difference in your testing and how it maps into the CoBIT framework. In either case of whatever a company is choosing, there will be overlap, there will be one over the other, but the bottom line for those asking for it is likely a need to maintain compliance with the CoBIT framework. It is a lot more than meets the eye and is well structured on the information security scale to both macro and micro manage many portions of security frameworks. Irrespective of the testing methodologies used, there is one end result and its this result that is likely what your client is worried about. Cobit maps most of the given frameworks and models and exceeds a lot of them, when you understand it a little better, you'll likely see the disconnect in someone asking for a pentest to help make sure the company is CoBIT compliant: Search ISACA for the term mapping it will give you a clearer picture of the mappings and overlap with the following: ITIL, CMM, ISO 17799, PMBOK, PRINCE2, NIST SP800-53, TOGAF =+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+ J. Oquendo SGFA, SGFE, C|EH, CNDA, CHFI, OSCP "Each player must accept the cards life deals him or her: but once they are in hand, he or she alone must decide how to play the cards in order to win the game." Voltaire 227C 5D35 7DCB 0893 95AA 4771 1DCE 1FD1 5CCD 6B5E http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x5CCD6B5E ------------------------------------------------------------------------ This list is sponsored by: Cenzic Security Trends Report from Cenzic Stay Ahead of the Hacker Curve! Get the latest Q2 2008 Trends Report now www.cenzic.com/landing/trends-report ------------------------------------------------------------------------ ------------------------------------------------------------------------ This list is sponsored by: Cenzic Security Trends Report from Cenzic Stay Ahead of the Hacker Curve! Get the latest Q2 2008 Trends Report now www.cenzic.com/landing/trends-report ------------------------------------------------------------------------
Current thread:
- CoBIT a Security Audit Framework? Jon Kibler (Dec 01)
- Re: CoBIT a Security Audit Framework? J. Oquendo (Dec 01)
- Re: CoBIT a Security Audit Framework? Jon Kibler (Dec 01)
- Re: CoBIT a Security Audit Framework? J. Oquendo (Dec 01)
- Re: CoBIT a Security Audit Framework? Andre Gironda (Dec 02)
- Re: CoBIT a Security Audit Framework? Jon Kibler (Dec 01)
- Re: CoBIT a Security Audit Framework? J. Oquendo (Dec 01)
- Re: CoBIT a Security Audit Framework? SD List (Dec 02)
- Re: CoBIT a Security Audit Framework? hightch0 (Dec 02)
- Re: CoBIT a Security Audit Framework? R. DuFresne (Dec 10)
- <Possible follow-ups>
- RE: CoBIT a Security Audit Framework? Katuruza, Patrick (Dec 02)
- Re: CoBIT a Security Audit Framework? J. Oquendo (Dec 01)