logo

ISSAF


Summary

The Information Systems Security Assessment Framework is designed to evaluate the network, system and application controls in penetration testing methodology. The version used in this section is ISSAF 0.2.1B.


Definitions

DefinitionRequirements
ISSAF-A_2_4. Assessment - Penetration
ISSAF-A_2_7. Assessment - Compromise remote users or sites
ISSAF-D_8. Network security - Password security testing (countermeasures)
ISSAF-E_1. Network security - Switch security assessment
ISSAF-D_1. Network security - Password security testing (gathering authentication credentials)
ISSAF-E_13. Network security - Switch security assessment (assess private VLAN attack)
ISSAF-E_21. Network security - Switch security assessment (VLAN reconfiguration)
ISSAF-E_22. Network security - Switch security assessment (layer 2 port authentication)
ISSAF-F_1. Network security - Router security assessment (router identification)
ISSAF-F_2. Network security - Router security assessment (common issues assessment)
ISSAF-F_5. Network security - Router security assessment (global countermeasures)
ISSAF-F_5_1. Network security - Router security assessment (turn on logging)
ISSAF-F_5_2. Network security - Router security assessment (limit telnet)
ISSAF-F_5_3. Network security - Router security assessment (protect passwords)
ISSAF-F_5_7. Network security - Router security assessment (disable non-essential services)
ISSAF-F_5_9. Network security - Router security assessment (configure ingress filtering)
ISSAF-G_9_8. Network security - Firewalls (identify firewall architecture)
ISSAF-G_12. Network security - Firewalls (port redirection)
ISSAF-G_13_4. Network security - Firewalls (application level)
ISSAF-G_14. Network security - Firewalls (countermeasures)
ISSAF-G_15. Network security - Firewalls (compromise remote users/sites)
ISSAF-H_14_3. Network security - Intrusion detection (detection engine)
ISSAF-H_14_7. Network security - Intrusion detection (detection engine)
ISSAF-H_14_13. Network security - Intrusion detection (detection engine)
ISSAF-H_14_17. Network security - Intrusion detection (detection engine)
ISSAF-H_15_9. Network security - Intrusion detection (rule configuration and management interface)
ISSAF-H_16_5. Network security - Intrusion detection (logging systems)
ISSAF-J_4. Network security - Anti-virus system (objective)
ISSAF-J_6_1. Network security - Anti-virus system (methodology)
ISSAF-J_6_4. Network security - Anti-virus system (methodology)
ISSAF-J_7_2. Network security - Anti-virus system (check end user antivirus)
ISSAF-J_7_3_5. Network security - Anti-virus system (methodology)
ISSAF-K_9_1. Network security - Storage Area Network SAN (practices for the data-at-rest)
ISSAF-L_3_1. Network security - WLAN security (types of threats)
ISSAF-L_4_3. Network security - WLAN security (audit and review)
ISSAF-L_4_5_6. Network security - WLAN security (exploitation and attacks)
ISSAF-L_8. Network security - WLAN security (global countermeasures)
ISSAF-P_4. Host security - Linux security (identify ports and services)
ISSAF-P_4_1. Host security - Linux security (identify ports and users)
ISSAF-P_6_1. Host security - Linux security (remote attacks)
ISSAF-P_6_3. Host security - Linux security (buffer overflows)
ISSAF-P_6_4. Host security - Linux security (stack based overflows)
ISSAF-P_6_5. Host security - Linux security (heap based overflows)
ISSAF-P_6_6. Host security - Linux security (integer overflows)
ISSAF-P_6_15. Host security - Linux security (local attacks)
ISSAF-P_6_16. Host security - Linux security (file and directory permission attacks)
ISSAF-Q_8_6_1. Host security - Windows security (brute force passwords or remote attack)
ISSAF-Q_16_10. Host security - Windows security (SMB attacks)
ISSAF-Q_16_13. Host security - Windows security (registry attacks)
ISSAF-Q_16_20. Host security - Windows security (local attacks)
ISSAF-Q_16_27. Host security - Windows security (DLL injection attack)
ISSAF-Q_16_34. Host security - Windows security (denial of service attacks)
ISSAF-S_5_1. Web server security - Countermeasures (secure administrative access)
ISSAF-S_5_4. Web server security - Countermeasures (enable logging and do periodic analysis)
ISSAF-S_5_7. Web server security - Countermeasures (Compartmentalize web server process)
ISSAF-S_5_8. Web server security - Countermeasures (run as a non-root user)
ISSAF-T_6_4. Web application assessment - Identifying web server vendor and version (default files)
ISSAF-T_6_5. Web application assessment - Identifying web server vendor and version (by extension of pages on web server)
ISSAF-T_6_6. Web application assessment - Identifying web server vendor and version (by error)
ISSAF-T_6_10. Web application assessment - Test view source bugs
ISSAF-T_10_1. Web application assessment – Attack on secure HTTP
ISSAF-T_11_1. Web application assessment - Brute force attack
ISSAF-T_12_2. Web application assessment - Browsable directories check
ISSAF-T_13_2. Web application assessment - Test invalidated parameters (Cross Site Scripting)
ISSAF-T_13_3. Web application assessment - Test invalidated parameters (Cross Site Tracing)
ISSAF-T_14_1. Web application assessment - URL manipulation
ISSAF-T_14_2. Web application assessment - Hidden form fields manipulation
ISSAF-T_14_3. Web application assessment - Cookie manipulation
ISSAF-T_16_1. Web application assessment - Input validation (validate data)
ISSAF-T_16_2. Web application assessment - Input Validation (test buffer overflow)
ISSAF-T_16_3. Web application assessment - Input Validation (PHP insertion)
ISSAF-T_17. Web application assessment - Test SQL injection
ISSAF-T_19_1. Web application assessment - Global Countermeasures (client-side)
ISSAF-T_19_2. Web application assessment - Global Countermeasures (server-side)
ISSAF-U_8. Web application SQL injections - Check SQL injection vulnerability
ISSAF-U_9. Web application SQL injections - Bypass user authentication
ISSAF-U_11. Web application SQL injections - Get control on host
ISSAF-U_15. Web application SQL injections – Countermeasures
ISSAF-V_6_1. Application security - Source code auditing (authentication)
ISSAF-V_6_3. Application security - Source code auditing (hash or digest authentication)
ISSAF-V_6_4. Application security - Source code auditing (forms based authentication)
ISSAF-V_7. Application security - Source code auditing (session management)
ISSAF-V_9. Application security - Source code auditing (data and input validation)
ISSAF-V_10. Application security - Source code auditing (Cross Site Scripting XSS)
ISSAF-V_11. Application security - Source code auditing (buffer overflows)
ISSAF-V_12. Application security - Source code auditing (error handling)
ISSAF-V_13. Application security - Source code auditing (command injection)
ISSAF-Y_2. Database Security - Oracle security assessment
ISSAF-Y_3_1. Database Security - Database services countermeasures
ISSAF-Y_3_4. Database Security - Database services countermeasures

Last updated

2023/09/18