Benchmark – Security Control Analysis
pdf
keyboard_arrow_up
School
Grand Canyon University *
*We aren’t endorsed by this school
Course
320
Subject
Information Systems
Date
Dec 6, 2023
Type
Pages
8
Uploaded by BailiffKnowledge19216
1
Benchmark
–
Security Control Analysis
Adrian Andrade
Grand Canyon University
ITT-430
Timothy Montgomery
Due October 1, 2023
2
Part 1:
Screenshots
3
Technical Report:
In this report, I have completed vulnerability assessments for the three virtual machines I set up
prior. The virtual machine names are: WS1, DC1, and SM1. All of which use the Windows
operating system.
For the SM1 assessment, 6 vulnerabilities were found: SMB Signing not required, SMB
(multiple issues), DCE Services Enumeration, Remote Desktop Protocol Service Detection,
Terminal Services Use SSL/TLS, and WS-Management Server Detection.
For SMB Signing not required
, the best measure is to enforce message signing in the host’s
configuration. The best security measure for SMB (multiple issues) is to enforce segmentation.
The best security measure for DCE Services Enumeration is to update DCE/RPC services to the
latest version. For Remote Desktop Protocol Service Detection, the best measures to take are to
close RDP ports, enforce account lockout, and limit the overall RDP users. For Terminal
Services Use SSL/TLS, the best measures is to use SSH keys, and utilize a successful VPC
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
4
network. For WS-Management Server Detection, the best measure is to secure the computer with
a strong password.
In the DC1 assessment, 3 vulnerabilities were found: SMB (Multiple Issues), DCE Services
Enumeration, and Nessus SYN scanner. With these vulnerabilities we must implement security
measures to reduce or eliminate them. For SMB (multiple issues), the best measures is to
implement segmentation and types of isolation techniques. For DCE services enumeration,
update the DCE/RPC services to the latest version, and evaluate whether using deep packet
inspection is viable. For Nessus SYN scanner, the best security measure is to protect your target
with an IP filter.
On the WS1 Assessment, 12 vulnerabilities were found: SMB Signing not required, SMB
(Multiple Issues), HTTP (Multiple Issues), DCE Services Enumeration, Nessus SYN Scanner,
Service Detection, NetBIOS Multiple IP Address Enumeration, Remote Desktop Protocol
Service Detection, Terminal Services Use SSL/TLS, Web Server Unconfigured
–
Default Install
Page Present, WMI Not Available, and WS-Management Server Detection.
For SMB Signing not required vulnerability, the best solution is to enforce message signing in
the host’s configuration.
For SMB (multiple issues), the best solution is to implement
segmentation. For HTTP (multiple issues),
it’s
best to remove all unnecessary services, and keep
patches up to date. The best security measures for DCE Services Enumeration is to update the
DCE/RPC services to the latest version. For Nessus SYN Scanner, the best security measure is to
protect your target with an IP filter. The best security measure for service detection is to update
your firewalls, and create a stronger password. For NetBIOS Multiple IP Address Enumeration,
5
the best measure is to ensure LDAP usernames are not replicated in other access models. For
Remote Desktop Protocol Service Detection, the best measures to take is to close rdp ports,
enforce account lockout, and limit the overall rdp users. For Terminal Services Use SSL/TLS,
the best measures is to use SSH keys, and utilize a successful VPC network. For Web Server
Unconfigured
–
Default Install Page Present, the best security measure is to utilize a strong
passwords. For the WMI not available vulnerability, the best measure is to correctly configure
the security options in settings. And lastly, for WS-Management Server Detection, the best
measure is to secure the computer with a strong password.
Part 2:
Windows Update:
6
Second Vulnerability Scan
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
7
8
Second Report:
In this report, we accounted for all the vulnerabilities found in each virtual machine after doing a
windows update for the machines. In WS1, we found three vulnerabilities in this report, as
opposed to one prior, which had 12 vulnerabilities found.
SM1 had 6 vulnerabilities found, which is the same amount found in the prior report (no change
basically). DC1 had 3 vulnerabilities found in the prior report, but had increased to 12
vulnerabilities in this report.
In total,
WS1’s vulnerabilities went down by 75%. 0% decrease and increase for SM1. And a
75% increase for DC1.