logo

Database

ISSAF

Last updated: 2023/09/18
logo

The Information Systems Security Assessment Framework is designed to evaluate the network, system and application controls in penetration testing methodology. The version used in this section is ISSAF 0.2.1B.

Control-Requirement Mapping

DefinitionRequirements
A_2_4. Assessment - Penetration
A_2_7. Assessment - Compromise remote users or sites
D_8. Network security - Password security testing (countermeasures)
E_1. Network security - Switch security assessment
D_1. Network security - Password security testing (gathering authentication credentials)
E_13. Network security - Switch security assessment (assess private VLAN attack)
E_21. Network security - Switch security assessment (VLAN reconfiguration)
E_22. Network security - Switch security assessment (layer 2 port authentication)
F_1. Network security - Router security assessment (router identification)
F_2. Network security - Router security assessment (common issues assessment)
F_5. Network security - Router security assessment (global countermeasures)
F_5_1. Network security - Router security assessment (turn on logging)
F_5_2. Network security - Router security assessment (limit telnet)
F_5_3. Network security - Router security assessment (protect passwords)
F_5_7. Network security - Router security assessment (disable non-essential services)
F_5_9. Network security - Router security assessment (configure ingress filtering)
G_9_8. Network security - Firewalls (identify firewall architecture)
G_12. Network security - Firewalls (port redirection)
G_13_4. Network security - Firewalls (application level)
G_14. Network security - Firewalls (countermeasures)
G_15. Network security - Firewalls (compromise remote users/sites)
H_14_3. Network security - Intrusion detection (detection engine)
H_14_7. Network security - Intrusion detection (detection engine)
H_14_13. Network security - Intrusion detection (detection engine)
H_14_17. Network security - Intrusion detection (detection engine)
H_15_9. Network security - Intrusion detection (rule configuration and management interface)
H_16_5. Network security - Intrusion detection (logging systems)
J_4. Network security - Anti-virus system (objective)
J_6_1. Network security - Anti-virus system (methodology)
J_6_4. Network security - Anti-virus system (methodology)
J_7_2. Network security - Anti-virus system (check end user antivirus)
J_7_3_5. Network security - Anti-virus system (methodology)
K_9_1. Network security - Storage Area Network SAN (practices for the data-at-rest)
L_3_1. Network security - WLAN security (types of threats)
L_4_3. Network security - WLAN security (audit and review)
L_4_5_6. Network security - WLAN security (exploitation and attacks)
L_8. Network security - WLAN security (global countermeasures)
P_4. Host security - Linux security (identify ports and services)
P_4_1. Host security - Linux security (identify ports and users)
P_6_1. Host security - Linux security (remote attacks)
P_6_3. Host security - Linux security (buffer overflows)
P_6_4. Host security - Linux security (stack based overflows)
P_6_5. Host security - Linux security (heap based overflows)
P_6_6. Host security - Linux security (integer overflows)
P_6_15. Host security - Linux security (local attacks)
P_6_16. Host security - Linux security (file and directory permission attacks)
Q_8_6_1. Host security - Windows security (brute force passwords or remote attack)
Q_16_10. Host security - Windows security (SMB attacks)
Q_16_13. Host security - Windows security (registry attacks)
Q_16_20. Host security - Windows security (local attacks)
Q_16_27. Host security - Windows security (DLL injection attack)
Q_16_34. Host security - Windows security (denial of service attacks)
S_5_1. Web server security - Countermeasures (secure administrative access)
S_5_4. Web server security - Countermeasures (enable logging and do periodic analysis)
S_5_7. Web server security - Countermeasures (Compartmentalize web server process)
S_5_8. Web server security - Countermeasures (run as a non-root user)
T_6_4. Web application assessment - Identifying web server vendor and version (default files)
T_6_5. Web application assessment - Identifying web server vendor and version (by extension of pages on web server)
T_6_6. Web application assessment - Identifying web server vendor and version (by error)
T_6_10. Web application assessment - Test view source bugs
T_10_1. Web application assessment – Attack on secure HTTP
T_11_1. Web application assessment - Brute force attack
T_12_2. Web application assessment - Browsable directories check
T_13_2. Web application assessment - Test invalidated parameters (Cross Site Scripting)
T_13_3. Web application assessment - Test invalidated parameters (Cross Site Tracing)
T_14_1. Web application assessment - URL manipulation
T_14_2. Web application assessment - Hidden form fields manipulation
T_14_3. Web application assessment - Cookie manipulation
T_16_1. Web application assessment - Input validation (validate data)
T_16_2. Web application assessment - Input Validation (test buffer overflow)
T_16_3. Web application assessment - Input Validation (PHP insertion)
T_17. Web application assessment - Test SQL injection
T_19_1. Web application assessment - Global Countermeasures (client-side)
T_19_2. Web application assessment - Global Countermeasures (server-side)
U_8. Web application SQL injections - Check SQL injection vulnerability
U_9. Web application SQL injections - Bypass user authentication
U_11. Web application SQL injections - Get control on host
U_15. Web application SQL injections – Countermeasures
V_6_1. Application security - Source code auditing (authentication)
V_6_3. Application security - Source code auditing (hash or digest authentication)
V_6_4. Application security - Source code auditing (forms based authentication)
V_7. Application security - Source code auditing (session management)
V_9. Application security - Source code auditing (data and input validation)
V_10. Application security - Source code auditing (Cross Site Scripting XSS)
V_11. Application security - Source code auditing (buffer overflows)
V_12. Application security - Source code auditing (error handling)
V_13. Application security - Source code auditing (command injection)
Y_2. Database Security - Oracle security assessment
Y_3_1. Database Security - Database services countermeasures
Y_3_4. Database Security - Database services countermeasures