logo

Database

OSSTMM3

Last updated: 2023/09/18
logo

The Open Source Security Testing Methodology Manual (OSSTMM) provides a methodology for the accurate characterization of operational security (OpSec) through examination and correlation of test results in a consistent way. It is one of the most complete and commonly used professional standards in security audits to review the security of systems from the internet. The version used in this section is OSSTMM 3.0, published on December 14, 2010.

Control-Requirement Mapping

DefinitionRequirements
8_5_2. Physical security (access verification) - Authentication
8_7_2. Physical security (controls verification) - Confidentiality
8_7_4. Physical security (controls verification) - Integrity
9_1_1. Wireless security (posture review) - Policy
9_2_2. Wireless security (logistics) - Communications
9_3_1. Wireless security (active detection verification) - Channel monitoring
9_4_1. Wireless security (visibility audit) - Interception
9_5_3. Evaluate configuration, authentication and encryption of wireless networks
9_5_4. Wireless security (access verification) - Authentication
9_5_5. Wireless security (access verification) - Access control
9_7_3. Wireless security (controls verification) - Privacy
9_7_4. Wireless security (controls verification) - Integrity
9_9_1. Wireless security (configuration verification) - Common errors
9_9_2. Wireless security (configuration verification) - Configuration controls
9_15_2. Wireless security (privileges audit) - Authorization
9_15_3. Wireless security (privileges audit) - Escalation
9_17_2. Wireless security (alert and log review) - Storage and retrieval
10_2_1. Telecommunications security (logistics) - Framework
10_3_1. Telecommunications security (active detection verification) - Monitoring
10_5_2. Telecommunications security (access verification) - Services
10_5_3. Telecommunications security (access verification) - Authentication
10_7_2. Telecommunications security (controls verification) - Confidentiality
10_7_3. Telecommunications security (controls verification) - Privacy
10_7_4. Telecommunications security (controls verification) - Integrity
10_9_3. Telecommunications security (configurations verification) - Configuration errors
10_15_2. Telecommunications security (privileges audit) - Authorization
11_3_1. Data networks security (active detection verification) - Filtering
11_5_3. Data networks security (access verification) - Authentication
11_6_2. Data networks security (trust verification) - Pishing
11_7_2. Data networks security (controls verification) - Confidentiality
11_7_3. Data networks security (controls verification) - Privacy
11_7_4. Data networks security (controls verification) - Integrity
11_9_1. Data networks security - Configuration controls
11_9_2. Data networks security - Common configuration errors
11_9_3. Data networks security - Limitations mapping
11_11_1. Data networks security - Privacy containment mapping
11_11_2. Data networks security (segregation review) - Disclosure
11_13_1. Data networks security - Business grinding
11_15_3. Data networks security (privileges audit) - Escalation
11_17_2. Data networks security (alert and log review) - Storage and retrieval