Dark Arts
  • index
  • BUY ME A BOOK
  • 🪄Dark Magic
    • Pentesting
      • Industry Methodologies
    • Scopes of Testing
    • Reconnaissance
      • Passive
        • WHOIS
        • DNS
          • nslookup
          • dig
        • WAF
        • Subdomain
        • Google Dork
        • Misc. Techniques
        • Leaked Passwords
      • Active
        • Browser & Plugins
        • ping & traceroute
        • fping
        • telnet & netcat
        • DNS
          • Zone Transfer
          • DNS Amplification DDoS Attack Breakdown
        • Misc. Techniques
    • Vulnerability Assessment
    • Attack Types
  • 🕷️Aragoogs Nest
    • Web Application Overview & Security
      • Security Testing
      • Common Threats & Risks
    • Web Application Architecture
      • Technologies
    • HTTP/S
      • Message
      • Request
      • Response
        • Status Code
    • Crawling/Spidering
  • 🧪Potions
    • Web Browsers
    • Computer Networking
      • Network Protocol
      • Packets
      • OSI Layer
        • Layer 3: Network
        • Layer 4: Transport
      • DNS
        • Primary-Secondary
        • Local Name Resolution
        • Domain Hierarchy
        • FQDN
        • Lookups
        • DNS Resolution
        • DNS Records
        • Security: Attack-Defense (Default)
  • 🎆Spells
    • 📜Linux Scroll
    • 📜WebShell Scroll
    • git
      • Attacks + Vulnerabilities
  • 🖼️Flaws w/ Magical Frameworks
    • Windows
      • In a Nutshell
      • CVE-2019-0708: BlueKeep
      • CVE-2017-0144: EternalBlue: MS17-010
      • Attacking Services
        • MS IIS - WebDAV
        • SMB
        • HTTP File Server (HFS)
        • Apache Tomcat Web Server
        • RDP
        • WinRM
      • File System Vulnerabilities
      • Credential Dumping
        • Password Search in Windows Configuration Files
        • Mimikatz
        • Pass-the-Hash Attack
    • Linux
      • In a Nutshell
      • CVE-2014-6271: Shellshock
      • Attacking Services
        • FTP
        • SSH
        • SAMBA
        • SMTP
        • RSYNC
      • Dumping Hashes
  • 🌼Marauder's Boost
    • Privilege Escalation
    • Windows PrivEsc
      • Windows Kernel Exploit
      • Bypassing UAC
      • Access Token Impersonation
    • Linux PrivEsc
      • Linux Kernel Exploit
      • Misconfigured Cron Jobs
      • Exploiting SUID Binaries
      • shells
      • File Permissions
  • ☠️Death Eaters
    • Post Exploitation
      • Windows
      • Linux
  • 🪄OLLIVANDERS
    • nmap
      • Host Discovery
      • Port Scan
      • Service & OS
      • NSE
      • Firewall/IDS Evasion
      • Scan Optimization
      • Misc. Methods
    • ffuf
    • Hydra
    • Metasploit Framework
      • Architecture
      • Must to Know
      • msfvenom
      • Auxiliary Modules
      • Service Enumeration
      • Vulnerability Scanning
      • Imports
      • Automating
    • Vulnerability Scanners
    • Wireshark
  • 🚂Platform 9(3/4)
    • Auth-Auth
      • Authentication
        • Password-based Authentication
        • Basic Authentication
        • Multi-factor Authentication
        • Access Token
        • Token-based Authentication
          • JWT
          • OAuth 2.0
    • Secure Headers
      • Content-Security-Policy (CSP)
    • Cryptography
      • Caesar Cipher
  • ⛲Port Pensieve
    • Enumeration
      • SMB & NetBIOS
      • SNMP
    • Wordlists
  • 🔆DUELS
    • Pivoting
    • SMB Relay Attack
  • 🗺️Marauder's Map
    • Web Application Pentesting
    • API Pentesting
      • GraphQL
        • Primer
    • Mobile Application Pentesting
  • 🎧SIDE CHANNEL
    • Side Channel Analysis
    • Timing Side-Channel Attacks
      • Vulnerable Login
  • 🥃Sky
    • Cloud Basics
    • Cloud Management
      • Shared Responsibility Model
    • Using Cloud Resources
      • Monitoring & Alerts
      • Identity & Access Management
      • Scalability & Availability
      • Solution Design
    • Cloud Providers
    • Cloud Security & Regulatory Compliance
      • Resource Protection
      • ICCA: Cloud Security & Regulatory Compliance
    • ICCA Preparation
      • Knowledge Tests
      • Lab
  • 🔷Obsidian
    • Pentest Engagement
      • Scoping
    • Pentest Ethics
      • Rules of Engagement
    • Auditing Fundamentals
      • Process/Lifecycle
      • Pentest & Security Auditing
      • GRC
      • Standards, Frameworks & Guidelines
      • From Audit to Pentest
  • 💢Threat Modeling
    • Why Threat Model?
  • 📡THREAT INTEL
    • Threat Intelligence
    • Tool Dump
  • 📱Anything-Mobile-IoT
    • Firmware
    • Firmware Analysis
      • Example: CVE-2016-1555
    • Firmware Installation/Flashing
  • 🎉Mischeif
    • Social Engineering
    • Phishing
      • GoPhish
    • Pretexting
Powered by GitBook
On this page
  • What is Security Auditing?
  • Importance of Security Auditing
  • Essential Terms
  • Types of Security Audits
  1. Obsidian

Auditing Fundamentals

What is Security Auditing?

Security Auditing is a systematic process of assessing and verifying an organization's security measures, controls, and compliance with standards, policies, and regulations. It involves reviewing information systems, networks, applications, and procedures to identify vulnerabilities and areas for improvement.

Importance of Security Auditing

  1. Identifying Vulnerabilities: Audits uncover weaknesses in systems and infrastructure, minimizing breach risks.

  2. Ensuring Compliance: Verifies adherence to standards like GDPR, HIPAA, and PCI DSS, preventing penalties.

  3. Enhancing Risk Management: Helps assess risks and develop strategies to mitigate them.

  4. Improving Policies: Identifies areas to enhance security policies and procedures, fostering a strong security culture.

  5. Supporting Business Objectives: Protects operations, builds customer trust, and ensures secure data handling.

  6. Continuous Improvement: Promotes an ongoing proactive approach to evolving threats and vulnerabilities.

Essential Terms

Term

Definition

Importance

Security Policies

Guidelines and rules that define how an organization secures its information and systems.

Establish a security framework, ensuring consistent practices and accountability.

Compliance

Adherence to relevant laws, regulations, and standards (e.g., GDPR, HIPAA, PCI DSS).

Prevents legal penalties, protects data, and builds stakeholder trust.

Vulnerability

Weaknesses in a system that can be exploited by threats.

Identifying vulnerabilities helps mitigate potential risks before they are exploited.

Control

Security mechanisms (technical, administrative, or physical) that protect systems.

Effective controls safeguard systems, ensuring they operate securely.

Risk Assessment

The process of identifying, evaluating, and prioritizing risks to an organization.

Helps prioritize and allocate resources to mitigate high-impact security risks.

Audit Trail

A chronological record of system activity, providing evidence of actions taken.

Ensures accountability, supports forensic investigations, and ensures data integrity.

Compliance Audit

A review to determine if an organization adheres to regulatory requirements.

Verifies legal and regulatory compliance, preventing fines and reputational damage.

Access Control

Mechanisms for managing who can view or use resources in a computing environment.

Protects sensitive data by limiting access to authorized users only.

Audit Report

A formal document outlining the findings of a security audit.

Provides actionable insights for improving security posture and compliance.

Types of Security Audits

Security audits can be categorized by their scope, methodology, and the organizational aspects they focus on. For penetration testers, understanding the different types of security audits is essential for tailoring testing strategies and ensuring comprehensive security assessments.

Security Audit

Objective

Importance

Example

Internal Audits

Evaluate security controls within the organization by internal teams.

Identify gaps and vulnerabilities early to improve internal processes.

A company's IT team auditing their data access controls.

External Audits

Conducted by third-party auditors to assess security from an outsider's perspective.

Provides an unbiased view of security posture and ensures objectivity.

Hiring a firm to assess cloud infrastructure security.

Compliance Audits

Ensure adherence to regulatory standards and industry requirements.

Avoid legal penalties and ensure compliance with regulations.

Verifying compliance with GDPR or PCI DSS for data protection.

Technical Audits

Assess technical aspects such as systems, networks, and configurations.

Identify technical vulnerabilities and harden system security.

Performing vulnerability scans and patch management audits.

Network Audits

Evaluate the security of an organization's network infrastructure.

Detect vulnerabilities like misconfigurations or weak firewall rules.

Auditing network segmentation and traffic monitoring tools.

Application Audits

Focus on security of applications, ensuring they are free from vulnerabilities.

Prevent application-level attacks like SQL Injection and XSS.

Auditing a web app for input validation and secure authentication.

PreviousRules of EngagementNextProcess/Lifecycle

Last updated 8 months ago

🔷