20.4: Include Tests for Presence of Unprotected System Information and Artifacts

Include tests for the presence of unprotected system information and artifacts that would be useful to attackers, including network diagrams, configuration files, older penetration test reports, emails or documents containing passwords or other information critical to system operation.

Asset Type

Security Function

Implementation Groups

N/A

N/A

2, 3

Dependencies

  • Sub-control 20.1: Establish a Penetration Testing Program

Inputs

  1. Penetration Testing Program document

Operations

  1. Manually review the Penetration Testing Program document (Input 1) to determine if it requires tests to discover the following unprotected system information:
    1. Network diagrams (M1)

    2. Configuration files (M2)

    3. Penetration test reports (M3)

    4. Emails or documents containing passwords or other information critical to system operation (M4)

Measures

  • M1 = Boolean value indicating if the Penetration Testing Program document requires tests to discover unprotected network diagrams; 1 if so, 0 otherwise

  • M2 = Boolean value indicating if the Penetration Testing Program document requires tests to discover unprotected configuration files; 1 if so, 0 otherwise

  • M3 = Boolean value indicating if the Penetration Testing Program document requires tests to discover unprotected penetration test reports; 1 if so, 0 otherwise

  • M4 = Boolean value indicating if the Penetration Testing Program document requires tests to discover unprotected emails or documents containing passwords or other critical system information; 1 if so, 0 otherwise

Metrics

Coverage

Metric

Does the Penetration Testing Program Includes Tests for the Presence of Unprotected
System Information and Artifacts?

Calculation

(M1 + M2 + M3 + M4) / 4