Page 1094 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1094

As with most tools, the capabilities for various vulnerability
                  scanners vary quite a bit. Before using a scanner, you should

                  research it to make sure it meets your security control objectives.


               Web vulnerability scans are an important component of an

               organization’s security assessment and testing program. It’s a good
               practice to run scans in the following circumstances:

                    Scan all applications when you begin performing web vulnerability
                    scanning for the first time. This will detect issues with legacy
                    applications.

                    Scan any new application before moving it into a production
                    environment for the first time.

                    Scan any modified application before the code changes move into

                    production.

                    Scan all applications on a recurring basis. Limited resources may
                    require scheduling these scans based on the priority of the
                    application. For example, you may wish to scan web applications
                    that interact with sensitive information more often than those that
                    do not.


               In some cases, web application scanning may be required to meet
               compliance requirements. For example, the Payment Card Industry
               Data Security Standard (PCI DSS), discussed in Chapter 4, “Laws,
               Regulations, and Compliance,” requires that organizations either
               perform web application vulnerability scans at least annually or install
               dedicated web application firewalls to add additional layers of
               protection against web vulnerabilities.


               In addition to Nessus, other tools commonly used for web application
               vulnerability scanning include the commercial Acunetix scanner, the
               open-source Nikto and Wapiti scanners, and the Burp Suite proxy tool.


               Database Vulnerability Scanning

               Databases contain some of an organization’s most sensitive
               information and are lucrative targets for attackers. While most
               databases are protected from direct external access by firewalls, web
   1089   1090   1091   1092   1093   1094   1095   1096   1097   1098   1099