RE: Wireless Audit Cost

From: Jimi Thompson (jimit@myrealbox.com)
Date: Sun Nov 02 2003 - 02:04:21 EST


You scenario has a couple of things that I think need clarification -
1) "complete analysis" - to me this means that a full audit of both
the wired and wireless networks is taking place. This is also
implied because you have discovered that the wired and wireless
networks aren't segmented properly. 2) "large mobile sales force" -
is this 300 or 3000? 3) what's the geography? country and/or
location have a BIG impact on price (example, I get paid a LOT more
in California or New York than I do in Las Vegas) and 4) as a general
rule, your consultant is a different person and/or firm than your
auditor (hence that whole thing about independent audits), so if you
perform the audit, you likely wouldn't be developing their actual
policy and conversely if you are the consultant who is developing the
security policy, you probably should not be the one conducting the
audit.

Other than getting the wireless AP's behind a VPN gateway, with the
scenario that you've given us, I'd be more concerned about those
laptops. I'd be wanting to pull in some of the laptops for a random
audit of what kind of information is on them and how well they are
being maintained, ESPEICALLY since they belong to your sales force.
There's an estimate that 40-60% of all laptops that are stolen are
stolen for the data and not the laptop. Depending on what's going on
with the laptops and what's already in place, but I could easily see
recommending something like Marimba or Altiris to handle patching and
a VPN client that will not connect unless preestablished conditions
are met (like having AV software with current updates).

I'd also be inclined to include remediation for the "critical issues"
in the estimate. In this case, that would be a VPN device with a
sufficient number of client licenses for all the wireless devices.
It would also include the time and labor to re-segment the wireless
network off the internal LAN. My thinking here is that if the
company's IT staff had either a) sufficient time, b) sufficient
know-how or c) sufficient clout to pull it off then it wouldn't be in
that shape in the first place. Even if the customer decided to have
the work done by a consultant or their own IT staff, they still know
what it should cost and there is absolutely no way to "misunderstand"
since the estimate will be line itemized showing precisely the
equipment, software, etc.

HTH,

Jimi

At 6:16 PM -0500 10/31/03, lbrooks@cs.fsu.edu wrote:
>Thank you for the input so far. It has been helpful.
>
>I had to go back and ask the prof for exactly what he was looking for. He is
>trying to get a feel for what would be a good ball park budget for a complete
>analysis from a private company to put in as a recommendation in the paper he
>is writing. (Someone in another post asked if I could post the study.
>Unfortunately, the paper is meant for publication so I cant. But should it get
>published I will be happy to pass along the name of the publication.)
>
>Here is the scenario that he and I came up with. The company is a medium sized
>company with three buildings and a large mobile sales force using wireless
>laptops. There are ten wireless points located on the internal LAN throughout
>the three buildings. The wired
>network has the usual security measures in place, i.e. firewall blocking
>incoming traffic but not outgoing, servers located in a DMZ (say an http
>server, mail server and dns all Win2K based), no IDS etc, all Cisco hardware.
>No security other than mac filtering on the wireless LAN. What we would be
>looking for is the estimated cost to do a full assessment of the
>vulnerabilities from the, admittedly completely insecure, wireless network to
>the main network and develop a wireless security plan for the organization.
>
>We understand that every network is different. We are just trying to get a
>ball
>park figure for what companies can expect when they go looking for this type
>of service. If that is not detailed enough please let me know and I will try
>to firm it up some more.
>
>Thank you,
>
>Louis Brooks
>Dept. of Computer Science
>Florida State University
>
>
>Quoting "Robert E. Lee" <robert@dyadsecurity.com>:
>
>> Your post looks like a RFQ (Request for Quote). :). The details you
>> provided are too scarce to answer fully. Are you looking for costs of
>> software, costs of training for your people... or costs to outsource a
>> wireless security project to a third party?
>>
>> If it's the latter, there are many security companies (including mine)
>> that would be willing to help you price out a project like this. This
>> sort of pricing/scooping phase is a "standard cost of doing business"
>> for us.
>>
>> Sincerely,
>>
>> Robert
>>
>> Robert E. Lee
>> CTO
>>
>> 3400 Irvine Ave, Building 118
>> Newport Beach, Ca 92660
>> T (949) 486-6600
>> F (949) 486-6001
>> robert@dyadsecurity.com
>>
>> > -----Original Message-----
>> > From: lbrooks@cs.fsu.edu [mailto:lbrooks@cs.fsu.edu]
>> > Sent: Friday, October 31, 2003 8:01 AM
>> > To: pen-test@securityfocus.com
>> > Subject: Wireless Audit Cost
>> >
>> > Hello List Members:
>> >
>> > I work for the Security Group at Florida State University's Department
>> of
>> > Computer Science. We are putting together some documentation for a
>> study
>> > on
>> > best practices in wireless security. One of the last bits of
>> information
>> > we
>> > need to collect for the study is the monetary costs associated with
>> > auditing a
>> > wireless network. I was hoping that some of the members on this list
>> would
>> > be
>> > willing to help us out with gathering the information. We are looking
>> at
>> > the
>> > projected costs associated with auditing a wireless campus with 10
>> access
>> > points for the study. If you have any information or can point me in
>> the
>> > right
>> > direction to finding this information I would be most appreciative.
>> >
>> > Thank you,
>> >
>> > Louis Brooks
>> > Dept. of Computer Science
>> > Florida State University
>> >
>> >
>> >
>> >
>> ------------------------------------------------------------------------
>> --
>> > -
>> > Network with over 10,000 of the brightest minds in information
>> security
>> > at the largest, most highly-anticipated industry event of the year.
>> > Don't miss RSA Conference 2004! Choose from over 200 class sessions
>> and
>> > see demos from more than 250 industry vendors. If your job touches
>> > security, you need to be here. Learn more or register at
>> > http://www.securityfocus.com/sponsor/RSA_pen-test_031023
>> > and use priority code SF4.
>> >
>> ------------------------------------------------------------------------
>> --
>> > --
>>
>>
>>
>>
>
>
>
>---------------------------------------------------------------------------
>Network with over 10,000 of the brightest minds in information security
>at the largest, most highly-anticipated industry event of the year.
>Don't miss RSA Conference 2004! Choose from over 200 class sessions and
>see demos from more than 250 industry vendors. If your job touches
>security, you need to be here. Learn more or register at
>http://www.securityfocus.com/sponsor/RSA_pen-test_031023
>and use priority code SF4.
>----------------------------------------------------------------------------

---------------------------------------------------------------------------
Network with over 10,000 of the brightest minds in information security
at the largest, most highly-anticipated industry event of the year.
Don't miss RSA Conference 2004! Choose from over 200 class sessions and
see demos from more than 250 industry vendors. If your job touches
security, you need to be here. Learn more or register at
http://www.securityfocus.com/sponsor/RSA_pen-test_031023
and use priority code SF4.
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:42 EDT