McAfee MTP08EMB3RUA Product Guide - Page 149

Types of scans, Scanning standards, Severity levels for vulnerabilities

Page 149 highlights

Using Vulnerability Scanning Types of scans 9 • Application servers - These act as the interface between the web server and the back-end databases and legacy systems. Hackers exploit vulnerabilities in these servers and their scripts to get access to internal databases that could potentially store private data. Some website configurations do not include application servers; the web server itself is configured to act in an application server capacity. • Domain name servers (DNS) - These resolve Internet addresses by translating domain names into IP addresses. Merchants or service providers might use their own DNS server or a DNS service provided by their ISP. If DNS servers are vulnerable, hackers can potentially spoof a merchant or service provider web page and collect private information. • Email servers - These typically exist in the DMZ and can be vulnerable to hacker attacks. They are a critical element to maintaining overall website security. • Load balancers - These increase the performance and the availability of an environment by spreading the traffic load across multiple physical servers. If your environment uses a load balancer, you should scan all individual servers behind the load balancer. Types of scans There are two basic types of scans. • Discovery scans - Identify which devices to scan: • DNS Discovery identifies active IP addresses within a domain. • Network Discovery identifies active IP addresses and open ports within a network. • Device audits - Examine a single host, IP address, or domain name for open ports and vulnerabilities. Scanning standards Vulnerability scans are based on these standards: • McAfee SECURE™ standard - Meets the website security vulnerabilities audit requirements mandated by HIPAA, GRAMM-LEACH-BILEY, SARBANES-OXLEY, and other federal legislation. • PCI standard - Complies with credit card issuers by meeting the vulnerability scanning requirements of the Payment Card Industry (PCI) data security standard (DSS). Devices that process payment card information must be scanned and show compliance with this standard quarterly. Severity levels for vulnerabilities Vulnerabilities can be assigned different levels of severity by the different standards. Because of this, it is possible for devices to be compliant with the McAfee SECURE standard but not the PCI standard, which has specific requirements developed for devices that process payment card data. Security level 5 (Urgent) 4 (Critical) Description Provide intruders with remote root or remote administrator capabilities. By exploiting these types of vulnerabilities, hackers can compromise the entire host. This category includes vulnerabilities that provide hackers full file-system read and write capabilities, and the ability for remote execution of commands as a root or administrator user. The presence of backdoors and Trojans also qualifies as an urgent vulnerability. Provide intruders with remote user capabilities, but not remote administrator or root user capabilities. Critical vulnerabilities give hackers partial access to file systems (for example, full read access without full write access). Vulnerabilities that expose highly sensitive information also qualify as critical vulnerabilities McAfee Total Protection Service 5.1.5 Product Guide 149

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175

Application servers
— These act as the interface between the web server and the back-end
databases and legacy systems. Hackers exploit vulnerabilities in these servers and their scripts to
get access to internal databases that could potentially store private data. Some website
configurations do not include application servers; the web server itself is configured to act in an
application server capacity.
Domain name servers (DNS)
— These resolve Internet addresses by translating domain names
into IP addresses. Merchants or service providers might use their own DNS server or a DNS service
provided by their ISP. If DNS servers are vulnerable, hackers can potentially spoof a merchant or
service provider web page and collect private information.
Email servers
— These typically exist in the DMZ and can be vulnerable to hacker attacks. They
are a critical element to maintaining overall website security.
Load balancers
— These increase the performance and the availability of an environment by
spreading the traffic load across multiple physical servers. If your environment uses a load
balancer, you should scan all individual servers behind the load balancer.
Types of scans
There are two basic types of scans.
Discovery scans
— Identify which devices to scan:
DNS Discovery identifies active IP addresses within a domain.
Network Discovery identifies active IP addresses and open ports within a network.
Device audits
— Examine a single host, IP address, or domain name for open ports and
vulnerabilities.
Scanning standards
Vulnerability scans are based on these standards:
McAfee SECURE
standard
— Meets the website security vulnerabilities audit requirements mandated by
HIPAA, GRAMM-LEACH-BILEY, SARBANES-OXLEY, and other federal legislation.
PCI standard
— Complies with credit card issuers by meeting the vulnerability scanning requirements
of the Payment Card Industry (PCI) data security standard (DSS). Devices that process payment
card information must be scanned and show compliance with this standard quarterly.
Severity levels for vulnerabilities
Vulnerabilities can be assigned different levels of severity by the different standards. Because of this,
it is possible for devices to be compliant with the McAfee SECURE standard but not the PCI standard,
which has specific requirements developed for devices that process payment card data.
Security
level
Description
5 (Urgent)
Provide intruders with remote root or remote administrator capabilities. By exploiting
these types of vulnerabilities, hackers can compromise the entire host. This category
includes vulnerabilities that provide hackers full file-system read and write
capabilities, and the ability for remote execution of commands as a root or
administrator user. The presence of backdoors and Trojans also qualifies as an urgent
vulnerability.
4 (Critical)
Provide intruders with remote user capabilities, but not remote administrator or root
user capabilities. Critical vulnerabilities give hackers partial access to file systems (for
example, full read access without full write access). Vulnerabilities that expose highly
sensitive information also qualify as critical vulnerabilities
Using Vulnerability Scanning
Types of scans
9
McAfee Total Protection Service 5.1.5 Product Guide
149