Wednesday, March 6, 2019

Line of Inquiry


Data Exposure
  • Exposure
    What was exposed?
    What caused the exposure? Application? DB?
    How was exposure discovered?
    Duration of exposure with time stamps?
    What is the application for? What data does the application possess or was exposed?
    Get exposed data?
  • Abuse
    Who accessed the data during exposure?
    What was accessed during exposure?
    Validate the data is deleted by unauthorized users. 
  • Lights On
    Is the application or misconfiguration causing the exposure has been stopped?
    Is the application fixed and back up?
    Service down time?
  • Controls
    What access controls were in place?
    What kind of logging was in place?
    What monitoring was in place?
    What security endpoints were in place?
  • Hygiene
    What assets are in scope?
    What does the dat flow look like? Design documents
    What are the ingress/Egress point?
  • Compliance - Legal
    Is data related to PCI? PII?Financial?Strategical?
    Vendor involvement?
    Legal requirement?
    Communications?  
  • Remediations
    What are the new security controls?
    Are the security controls reviewed or tested?

    Additional questions should be expected as information is reviewed.


No comments:

Post a Comment