#
Glossary
The glossary of terms below is intended to help you understand any aspects of the NetSPI Platform that may be unfamiliar. The terms included here are grouped by module: Pen Testing as a Service (PTaaS), Breach and Attack Simulation (BAS), and External Attack Surface Management (EASM).
#
PTaaS glossary
This glossary section includes common terminology used with the Pen Testing as a Service (PTaaS) module.
#
Asset
A particular location that a vulnerability could be found, such as an IP address, a web server, or a source code file.
#
Business unit
A container for related data and projects. A business unit can represent a company, a department or business unit, or something as specific as an individual application or network.
#
Checklist
A list of items that must be followed throughout the course of a project.
#
Correlation
The association of findings belonging to a specific vulnerability to a NetSPI Platform primary finding.
#
CPE
Common Platform Enumerations
For more information, see https://nvd.nist.gov/products/cpe.
#
CVE
Common Vulnerabilities and Exposures.
For more information, see https://cve.mitre.org/.
#
CVSS
Common Vulnerability Scoring System.
For more information, see https://www.first.org/cvss/.
#
CWE
Common Weakness Enumeration.
For more information, see https://cwe.mitre.org/.
#
Data source
A container for data imported from a scanning or testing tool.
#
Document
A file related to a project, such as a report or scope information.
#
Engagement
A container for data and information related to penetration tests and vulnerability scans. This includes data sources, assets, checklists, documents, and workspaces.
#
Exploit
The act of taking advantage of a vulnerability.
#
Instance
A single occurrence of a detected vulnerability on a particular asset.
#
Global Instance
The first published instance in a set of duplicates.
#
Duplicate Instance
An instance that has already been discovered before, paired with a Global Instance.
#
Finding tree
An area in a NetSPI Platform workspace that contains an organized list of findings.
#
Correlation reference
A construct used by the NetSPI Platform to link a finding to a primary finding.
#
Finding
A container for instances belonging to a particular combination of asset and primary finding.
#
Manual instance
An instance created manually instead of automatically imported from scan data.
#
Primary finding
A generic vulnerability write-up that crosses all workspaces, projects, and organizations. A primary finding contains all of the relevant information about a vulnerability without being specific to any asset or environment.
#
Primary finding variation
A component of a primary finding that determines the information associated with a finding, such as the vulnerability description, business impact, instructions, and references.
#
NIST
National Institute of Standards and Technology.
For more information, see https://www.nist.gov/.
#
NVD
National Vulnerability Database.
For more information, see https://nvd.nist.gov/.
#
OWASP
Open Web Application Security Project.
For more information, see https://www.owasp.org.
#
Questionnaire
A list of questions used to identify key information about the project, such as what needs to be scanned or tested.
#
Risk
The potential loss or damage resulting from an vulnerability being exploited.
#
Threat
The intent to cause harm or damage to an asset.
#
Validation
A confirmation of a vulnerability fix.
#
Variation
See Primary finding variation.
#
Verification
Evidence that a vulnerability exists on an asset as described by a reported instance.
#
Vulnerability
A security flaw found on an asset.
#
Workspace
A data container to review, manage, and update findings.
#
BAS glossary
This glossary section includes common terminology used with the Breach and Attack Simulation (BAS) module.
#
Detection Levels Definitions
- Full
- Logging, detection, or alerts were observed during the test.
- None
- Logging, detection, or alerts were not observed during the test.
- Partial
- Logging, detection, or alerts were only generated for a subset of the environment or unit test variations.
- Untested
- The unit test has not been performed.
#
Visibility Levels Definitions
- Logged
- Logs are records of events. They often include network, application, database, and endpoint events. Without proper logging, detections and alerts cannot be created for incident response teams.
- Detected
- Refers to any event that has been identified as anomalous or possible malicious behavior. However, some detections may not generate an alert or response.
- Alerted
- Refers to any event that has been identified as malicious and requires triage from the incident response team based on criteria defined by the security operations runbooks.
- Responded
- Refers to the ticket or email generated by an alert that triggers the incident response team to begin triaging the event.
- Prevented
- To what degree did the controls prevent potentially malicious behaviors/events from occurring based on detections.
#
Miscellaneous A-Z definitions
- Accepted Risk
- A finding can be marked as an "Accepted Risk" and will no longer appear as a threat in need of remediation.
- Agent
- NetSPI's Breach and Attack Simulation agent is a non-persistent piece of software that runs in-memory. It is used to run the plays and playbooks.
- Alerted
- An alert refers to any event that has been identified as malicious and requires triage from the incident response team based on criteria defined by the security operations runbooks.
- Default Operation
- By default, an operation called "All Procedures" is created. This operation contains all current, as well as future, procedures.
- Detected
- A detection refers to any event that has been identified as anomalous or possible malicious behavior. However, some detections may not generate an alert or response.
- Heatmap
- The heatmap dashboard is designed to present the tactics, techniques, and procedures associated with your operation in the context of a more traditional MITRE ATT&CK heatmap format.
- Logged
- Logs are records of events. They often include network, application, database, and endpoint events. Without proper logging, detections and alerts cannot be created for incident response teams.
- Malware
- Malicious software designed to disrupt, damage, or gain unauthorized access to a computer system or network.
- Operation
- Operations define the scope of plays, playbooks, and the agents they run on. They also define the scope of the detective control coverage tracking.
- Play
- Automation for a specific manual procedure.
- Playbook
- A collection of plays that can be executed in a predefined order to simulate threats.
- Prevented
- To what degree did the controls prevent potentially malicious behaviors/events from occurring based on detections.
- Procedure
- This refers to the sequence of actions performed to execute a technique. The procedure involves detailed descriptions of the procedure, manual attack instructions, detection and prevention recommendations, other educational content and references.
- Responded
- This refers to the ticket or email generated by an alert that triggers the incident response team to begin triaging the event.
- Tactic
- The threat actor's intended goal and reason for performing an action.
- Technique
- The broad description of how a threat actor accomplishes their goal.
- Threat Actor
- An individual or group that intentionally cause harm to digital devices or systems.
- Timeline
- The timeline dashboard is designed to help you track your detective control coverage for an operation over time. Here you can see where you have gotten better and worse.
- Workspace
- The workspace is designed to provide insights into your current detective control coverage. It helps you learn about, test, measure, and track all the tactics, techniques, and procedures associated with your operation.
#
EASM glossary
This glossary section includes common terminology used with the External Attack Surface Management (EASM) module.