RE: Canned audits

From: Clemens, Dan (Dan.Clemens@healthsouth.com)
Date: Sat Mar 25 2006 - 10:20:03 EST



As for methodologies you may want to follow the NSA's assessment methodoloty or Open Source Security Testing Methodology from isacom.


If you are looking for products to help you in this you may want to check out the product preventsys offers
http://www.preventsys.com

-Daniel Clemens

-----Original Message-----
From: ROB DIXON [mailto:rdixon@workforcewv.org]
Sent: Fri 3/24/2006 1:27 PM
To: pen-test@securityfocus.com
Cc:
Subject: Canned audits
Hi All,
 
We have had many audits in the past by 3 party vendors. My company is finally interested in performing some of these audits in house and a little more frequently than the annual 3rd party audits.
 
My question is, is there a software package, a "canned" audit that can be performed? Basic info gathering questions regarding authentication controls, network documentation(how and where it is stored), question that should be asked regarding wireless AP and other basic security questions?
 
-Rob Dixon

Robert L. Dixon, CSO
CHFI A+
State of West Virginia's
West Virginia Office of Techonology
Infrastructure Applications
Netware/GroupWise Administrator
Telephone: (304)-558-5472 ex.4225
Email:rdixon@workforcewv.org

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------




-----------------------------------------
Confidentiality Notice: This e-mail communication and any
attachments may contain confidential and privileged information for
the use of the designated recipients named above. If you are not
the intended recipient, you are hereby notified that you have
received this communication in error and that any review,
disclosure, dissemination, distribution or copying of it or its
contents is prohibited. If you have received this communication in
error, please notify me immediately by replying to this message and
deleting it from your computer. Thank you.

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
As attacks through web applications continue to rise, you need to proactively
protect your applications from hackers. Cenzic has the most comprehensive
solutions to meet your application security penetration testing and
vulnerability management needs. You have an option to go with a managed
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm).
Download FREE whitepaper on how a managed service can help you:
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:44 EDT