adammontville / cis-controls-71-measures

0 stars 0 forks source link

Subcontrol 3.2 #45

Open adammontville opened 5 years ago

adammontville commented 5 years ago

Perform authenticated vulnerability scanning with agents running locally on each system or with remote scanners that are configured with elevated rights on the system being tested.

Measures

None provided

Metrics

None provided
adammontville commented 5 years ago

Question for Controls Team:

apiperCIS commented 5 years ago

Initially, the UNCC proposal was a boolean, authenticated or not. They said you can't get this data from netflow; instead you'd need a snort rule to grab a field from the traffic to confirm that authentication took place.

There was also discussion centering around - if a vuln scanner is certified as SCAP-compliant as measured in 3.1, whether you can get much of 3.2 for free by virtue of using the certified scanner (CIS-CAT Assessor example: using Assessor logs here). While UNCC understandably doesn't want to "trust the tool", there was discussion of whether you are really trusting the certification process here, not just the tool itself.

wmunyan commented 5 years ago

I'll add a note that I just thought of in reference to SCAP compliance. The current active SCAP validation program (1.2 or 1.3) only validates for an "authenticated configuration scanner", and allows the addition of the "CVE option" in the validation.

Does that suffice for this subcontrol? If a tool is an "authenticated configuration scanner with CVE option" does that meet the measure for this?

adammontville commented 5 years ago

NOTE: This seems to require three things: 1) the list of scanning tools, 2) knowledge of which of those tools are authenticated scanners, and 3) verification that they're being used (i.e. scans have been run). Also note that UNCC's measures are centered on inspecting network traffic to determine whether a scanner is authenticated.

Inputs:

Operations:

Measures:

Metrics:

adammontville commented 5 years ago

Mapping component:

Goal: Get a coverage metric out of the above.

adammontville commented 5 years ago

NOTE: This seems to require three things: 1) the list of scanning tools, 2) knowledge of which of those tools are authenticated scanners, and 3) verification that they're being used (i.e. scans have been run). Also note that UNCC's measures are centered on inspecting network traffic to determine whether a scanner is authenticated.

Inputs:

Operations:

Measures:

Metrics: