logo

OSSTMM3


Summary

The Open Source Security Testing Methodology Manual (OSSTMM) provides a methodology for the accurate characterization of operational security (OpSec) through examination and correlation of test results in a consistent way. It is one of the most complete and commonly used professional standards in security audits to review the security of systems from the internet. The version used in this section is OSSTMM 3.0, published on December 14, 2010.


Definitions

DefinitionRequirements
OSSTMM3-8_5_2. Physical security (access verification) - Authentication
OSSTMM3-8_7_2. Physical security (controls verification) - Confidentiality
OSSTMM3-8_7_4. Physical security (controls verification) - Integrity
OSSTMM3-9_1_1. Wireless security (posture review) - Policy
OSSTMM3-9_2_2. Wireless security (logistics) - Communications
OSSTMM3-9_3_1. Wireless security (active detection verification) - Channel monitoring
OSSTMM3-9_4_1. Wireless security (visibility audit) - Interception
OSSTMM3-9_5_3. Evaluate configuration, authentication and encryption of wireless networks
OSSTMM3-9_5_4. Wireless security (access verification) - Authentication
OSSTMM3-9_5_5. Wireless security (access verification) - Access control
OSSTMM3-9_7_3. Wireless security (controls verification) - Privacy
OSSTMM3-9_7_4. Wireless security (controls verification) - Integrity
OSSTMM3-9_9_1. Wireless security (configuration verification) - Common errors
OSSTMM3-9_9_2. Wireless security (configuration verification) - Configuration controls
OSSTMM3-9_15_2. Wireless security (privileges audit) - Authorization
OSSTMM3-9_15_3. Wireless security (privileges audit) - Escalation
OSSTMM3-9_17_2. Wireless security (alert and log review) - Storage and retrieval
OSSTMM3-10_2_1. Telecommunications security (logistics) - Framework
OSSTMM3-10_3_1. Telecommunications security (active detection verification) - Monitoring
OSSTMM3-10_5_2. Telecommunications security (access verification) - Services
OSSTMM3-10_5_3. Telecommunications security (access verification) - Authentication
OSSTMM3-10_7_2. Telecommunications security (controls verification) - Confidentiality
OSSTMM3-10_7_3. Telecommunications security (controls verification) - Privacy
OSSTMM3-10_7_4. Telecommunications security (controls verification) - Integrity
OSSTMM3-10_9_3. Telecommunications security (configurations verification) - Configuration errors
OSSTMM3-10_15_2. Telecommunications security (privileges audit) - Authorization
OSSTMM3-11_3_1. Data networks security (active detection verification) - Filtering
OSSTMM3-11_5_3. Data networks security (access verification) - Authentication
OSSTMM3-11_6_2. Data networks security (trust verification) - Pishing
OSSTMM3-11_7_2. Data networks security (controls verification) - Confidentiality
OSSTMM3-11_7_3. Data networks security (controls verification) - Privacy
OSSTMM3-11_7_4. Data networks security (controls verification) - Integrity
OSSTMM3-11_9_1. Data networks security - Configuration controls
OSSTMM3-11_9_2. Data networks security - Common configuration errors
OSSTMM3-11_9_3. Data networks security - Limitations mapping
OSSTMM3-11_11_1. Data networks security - Privacy containment mapping
OSSTMM3-11_11_2. Data networks security (segregation review) - Disclosure
OSSTMM3-11_13_1. Data networks security - Business grinding
OSSTMM3-11_15_3. Data networks security (privileges audit) - Escalation
OSSTMM3-11_17_2. Data networks security (alert and log review) - Storage and retrieval

Last updated

2023/09/18