Rules of Engagement
Rules of Engagement
Rules of Engagement
Rules of Engagement
Version 1.0
Revision History
Date Version Description Author
01/20/15 1.0 First version Test Team
1. INTRODUCTION
1.1. These Rules of Engagement (ROE) establish guidelines that determine how EGS (AC) will
conduct electronic and physical security tests for Tested Organization. They are based
on the National Institute of Standards and Technology (NIST) Special Publication 800-42,
“Guideline on Network Security Testing.”
1.2. NIST SP 800-42 recommends that Rules of Engagement “should include:
Specific IP addresses/ranges to be tested
Any restricted hosts (i.e., hosts, systems, subnets, not to be tested)
A list of acceptable testing techniques (e.g. Social engineering, DOS, etc.) and tools
(password crackers, network sniffers, etc.)
Times when testing is to be conducted (e.g., during business hours, after business
hours, etc.)
Identification of a finite period for testing
IP addresses of the machines from which penetration testing will be conducted so
that administrators can differentiate the legitimate penetration testing attacks
from actual malicious attacks
Points of contact for the penetration testing team, the targeted systems, and the
networks
Measures to prevent law enforcement being called with false alarms (created by
the testing)
Handling of information collected by the penetration test team.”
1.3. The following documents are incorporated by reference and, when used in conjunction
with these Rules of Engagement, employ all NIST 800-42 ROE recommendations:
1.3.1. Engagement Letter, dated DD MMM YY, between EGS and TORG
1.3.2. Authorization to Perform Internet (External) Information Security Assurance
Procedures, dated DD MMM YY, signed by TORG
1.3.3. Authorization to Perform Network (Internal) Information Security Assurance
Procedures, dated DD MMM YY, signed by TORG
1.3.4. “Tested Organization Test Plan”, dated DD MMM YY
1.4. A Glossary appears at the end of this document.
1.5. To implement NIST recommendations, the ROE
describe the test objective(s), scope(s) and approach(es) we use
prescribe when, where, how, against what assets and whom we conduct security
testing
designate both administrative and operational Points of Contact (POC) within the
target organization and AC
stipulate general and specifically permitted and prohibited behaviors
stipulate specific procedures to be followed for various scenarios
help ensure that our security tests achieve maximum effectiveness with minimal
operational impact to the organization.
2. TEST OBJECTIVE
Determine the effectiveness of Tested Organization’s security program in preventing or detecting
unauthorized external and internal access to logical and physical assets. Specific objectives for
each test are contained in the “Tested Organization Test Plan.”
3. TEST SCOPE
Testing will commence on 20 January 2015 and conclude on 31 April 2015. External and internal
logical testing and physical penetration testing (social engineering) will be performed. Not all
logical and physical assets under Tested Organization control will be tested. Items approved for
testing are described in paragraph 8 and items excluded from testing are described in paragraph
9. Additional restrictions may have been placed on sub-components of individual tests and these
additional restrictions are discussed in the “Tested Organization Test Plan.
4. GENERAL APPROACH
4.1. In agreement with Tested Organization, we will conduct only logical external testing from
the Internet | only logical testing from inside the TORG facilities | both external and
internal logical testing of the TORG network. Physical penetration testing is | is not a
part of our testing approach.
4.1.1. Physical penetration testing will be conducted using various social engineering
techniques to persuade or deceive TORG employees to provide access to non-public
facilities and information.
4.1.2. Our logical tests will be conducted covertly/overtly using NIST’s
4.1.2.1. “Red Teaming” approach, where security testing is conducted without the
knowledge of the organization’s IT staff, but with full knowledge and
permission of upper management. During covert testing, we will attempt to
avoid detection by the TORG IT staff and obscure our testing activities.
4.1.2.2. “Blue Teaming” approach, where security testing is conducted with the
knowledge and consent of the organization’s IT staff. We will announce testing
windows but not specific dates and times for testing and report testing
progress to the designated TORG Point of Contact (POC). During our overt
testing activity, we will monitor TORG’s response to our testing | and we will
take no measures to avoid detection.
4.1.3. Logical testing will be performed:
4.1.3.1. As an “outsider” with no information about the client’s computer systems.
4.1.3.2. With “some” knowledge of the client’s computer system(s) in a role
functionally equivalent to the knowledge of an average user.
4.1.3.3. With “complete” knowledge of the client’s computer system(s) in a role
functionally equivalent to an individual with administrative access.
4.1.4. We use a four-step approach:
4.1.4.1. Discovery (Information Gathering)
4.1.4.2. Vulnerability analysis
4.1.4.3. Exploitation
4.1.4.4. Reporting
4.1.5. Procedures for discovery, vulnerability analysis and exploitation vary by test and are
contained in the “Tested Organization Test Plan.”
4.2. Our reporting method compares TORG’s certification and accreditation process,
implemented and approved security policies and procedures, and the results of security
controls tests with NIST | FISCAM | FISMA | ISO/IEC 17799 | generally accepted best
practices doctrine.
4.3. Comparing the results of our network security tests with TORG’s policies and procedures
will highlight areas in which current practices are not congruent with approved policies
and procedures. Comparing TORG’s policies, procedures and the results of our network
security tests with established doctrine will spotlight areas in which the organization can
improve its’ security posture relevant to published standards.
4.4. Results of vulnerability scans will be taken at face value and will not be discounted for
potential mitigating factors such as possibility of detection unless those factors were
evaluated as part of the test.
5. TESTING TIMETABLE
5.1. External testing will begin prior to the start of internal testing.
5.2. EGS will endeavor to complete external testing before the start of internal testing.
5.2.1. External testing commences XXXX and ends YYYY.
5.2.2. Internal testing commences XXXX and ends YYYY.
5.3. Physical penetration testing commences simultaneously with external logical testing and
continues throughout the engagement, for as long as results are obtained.
5.4. Specific dates and times for each test are defined in the “Tested Organization Test Plan.”
6. TESTING LOCATIONS
6.1. External testing will be executed from our offices in Tucson AZ. IP addresses and
information on hosts used for external testing are located in “Authorization to Perform
Internet (External) Information Security Assurance Procedures.”
6.2. Internal testing will be executed from a location provided by Tested Organization. IP
addresses and information on hosts used for internal testing are located in
“Authorization to Perform Network (Internal) Information Security Assurance
Procedures.”
8. ITEMS TO BE TESTED
8.1 Logical
8.1.1 For a list of Internet (External) IP addresses to be tested, please see
“Authorization to Perform Internet (External) Information Security Assurance
Procedures.”
8.1.2 For a list of network (Internal) IP addresses to be tested, please see
“Authorization to Perform Network (Internal) Information Security Assurance
Procedures.”
8.2 Physical
8.2.1 Locations
8.2.1.1 Corporate Headquarters
8.2.1.2 East Side Branch
8.2.1.3 West Side Branch
8.2.2 Personnel
8.2.2.1 Members of the Help Desk Department
8.2.2.2 Members of the IT Staff
9. ITEMS NOT TO BE TESTED
9.1 Logical
9.1.1 See “Authorization to Perform Internet (External) Information Security
Assurance Procedures”
9.1.2 See “Authorization to Perform Network (Internal) Information Security
Assurance Procedures”
9.2 Physical
9.2.1 Locations
9.2.1.1 Data Center
9.2.1.2 North Branch
9.2.1.3 South Branch
9.2.2 Personnel
9.2.2.1 Senior Management
9.2.2.2 Tellers
10. DESIGNATED POINTS OF CONTACT
10.1. Tested Organization
10.1.1 Administrative Point(s) of Contact for coordination of EGS inquiries and
requirements
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
Printed Name:
Title:
Responsibility Area
Email:
Contact No.:
Address:
19. APPROVALS
19.1 Tested Organization
Printed Name
Title
Signature
Date
19.2 EGS
Printed Name
Title
Signature
Date
Glossary
Black Box Black Box testing is used when the organization desires to test internal or
Penetration external network security from the perspective of an outsider with no
Test: knowledge of the organization, other than that which is in the public domain
and freely available to anyone. The attacker has no advance knowledge of the
organization, except, perhaps, the name of the target. Black box testing most
closely simulates what an organization could expect from an outside attack in
that, once any discovered vulnerability is exploited and access to the network
is gained, the attacker continues to exploit a specific vulnerability as far as
possible, with the ultimate goal of obtaining administrative-level access to the
vulnerable machine or extending network control to other machines. Because
only the first successful vulnerability is exploited, other vulnerabilities within
the network go untested and may leas to a false sense of security. Attacks are
carried out as covertly as possible. Once the attacks are observed and reported
by the target organization, black box testing ceases. Black box testing is also
referred to as “no knowledge testing.” It is the most unreliable form of
penetration testing.
Crystal Box Crystal Box testing is used when the organization desires to test internal or
Penetration external network security from the perspective of an attacker with full and
Test complete knowledge of the organization, similar to the knowledge possessed
by an administrator. This knowledge normally includes passwords for routers,
firewalls and IDS Systems, network topology, machine configurations and
other information that an IT administrator would possess. As many discovered
vulnerabilities as possible are exploited within the timeframe specified in the
engagement letter. Attacks may be carried out overtly or covertly, as the
organization desires. Crystal box testing provides the most thorough
assessment of the security posture of the network, in that multiple attack
avenues are pursued with detailed knowledge of the organization. Crystal box
testing is also referred to as “full knowledge testing” or “white box testing.”
Grey Box Grey Box testing is used when the organization desires to test internal or
Penetration external network security from the perspective of an attacker with only limited
Test knowledge of the organization, similar to the knowledge possessed by a non-
IT employee. This knowledge normally includes machine names, shared folder
names, IP addresses, naming conventions and other information that a normal
user with no special access would know about the target organization. As
many discovered vulnerabilities as possible are exploited within the timeframe
specified in the engagement letter. Attacks may be carried out overtly or
covertly, as the organization desires. Grey box testing assures a more thorough
assessment of the security posture of the network, in that several possible
attack avenues are pursued. Grey box testing is also referred to as “partial
knowledge testing.”
Internet Foot Internet foot printing uses the Internet to search for information in the public
Printing domain that could assist an attacker in gaining access to the target’s network.
While some information placed in the public domain is required by law,
regulation, or to assist in conducting business, excess information in the public
domain could result in an attacker gaining enough knowledge to conduct
logical, physical or social engineering attacks against the target. Expected
results of Internet Foot Printing are: location addresses, business hours,
telephone and fax numbers, contact names and e-mail addresses; partners;
merger/acquisition news; privacy and security policies in place; links to other
Web servers; employee names and information; networking equipment used;
Web pages using input forms, assigned IP address ranges and Points of Contact,
etc.
Vulnerability The objective of vulnerability testing is to discover possible attack vectors that
Assessment can be used to compromise the target network. It is a systematic examination
of an information system or product to determine the adequacy of security
measures, identify security deficiencies, provide data from which to predict the
effectiveness of proposed security measures, and confirm the adequacy of
such measures after implementation.