Observable Security Characteristics

O

Observable Security Characteristics are the attributes and behaviors of a system, network, or organization that can be perceived or measured and provide insights into its security posture. These characteristics can be used to assess the presence and effectiveness of security controls.

Here's a detailed explanation:

  • Attributes of Systems and Networks: This includes configurations, protocols, software versions, open ports, encryption methods, and access control settings. For example, whether a server uses HTTPS, or if a network has open ports that should be closed.

  • Behaviors: This refers to actions and responses, such as how a system responds to an unauthorized access attempt, patterns of network traffic, user authentication processes, and the speed of patching vulnerabilities. For instance, if a system locks out an account after several failed login attempts or if network traffic shows unusual data transfers.

  • Organizational Practices: This involves policies, procedures, and actions an organization takes, like how often they conduct security audits, employee security awareness training programs, and incident response plans, and how quickly they address reported vulnerabilities. For example, if a company has a policy that requires multi-factor authentication for remote access,

  • Detection and Assessment: Security professionals detect and assess observable security characteristics to understand the security level of a system, network, or organization.

  • Indicators: They indicate either strong security practices or potential weaknesses.

  • External vs. Internal: These characteristics can be observed externally (from the internet) and internally (within the organization's network), providing different perspectives on security.

ThreatNG excels at identifying and presenting an organization's Observable Security Characteristics, providing valuable insights into its security posture.

External Discovery: Revealing the Basics

ThreatNG's external discovery process is the first step in observing security characteristics. By performing unauthenticated discovery, it reveals fundamental attributes of the organization's external presence:

  • Websites and Applications: ThreatNG identifies the presence of these and the technologies they use, which are observable characteristics.

  • Network Services: It detects open ports and exposed services (e.g., FTP, SSH), which are crucial observable security characteristics.

  • DNS Records: ThreatNG analyzes DNS records, revealing information about mail servers, subdomains, and other infrastructure.

External Assessment: Deep Dive into Observable Characteristics

ThreatNG's external assessment capabilities provide a much deeper look at observable security characteristics:

Reporting: Communicating the Observations

ThreatNG's reporting capabilities are crucial for presenting the observed security characteristics in a clear and actionable format. Reports use these observations to assess risk and prioritize remediation.

Continuous Monitoring: Tracking Changes

ThreatNG's continuous monitoring ensures that changes in observable security characteristics are detected promptly. This is vital because an organization's security posture can change rapidly.

Investigation Modules: Detailed Analysis

ThreatNG's investigation modules allow for in-depth analysis of observed security characteristics:

  • Domain Intelligence: This module provides detailed information about domain-related characteristics, such as DNS records, subdomains, and email configuration.

  • Code Intelligence: The "Sensitive Code Exposure" module allows for deep dives into the characteristics of code repositories.

  • Cloud and SaaS Intelligence: The "Cloud and SaaS Exposure" module provides detailed information about the organization's use of cloud services.

Intelligence Repositories: Contextualizing Observations

ThreatNG's intelligence repositories provide context for the observed security characteristics. For example, vulnerability data helps assess the risk associated with outdated software.

Working with Complementary Solutions

ThreatNG's observations can be integrated with other security tools to enhance their effectiveness:

  • SIEM: ThreatNG's data can enrich SIEM alerts with external context.

  • Vulnerability Management: ThreatNG's external view complements internal vulnerability scanning.

ThreatNG is a powerful tool for identifying, analyzing, and using observable security characteristics to improve an organization's security posture.

Previous
Previous

In-Band Indicators

Next
Next

External Attack Surface