2 BACKGROUND
Every year, ISACA publishes a summary of the state
of the art, i.e. the state of the field and the latest inno-
vations in cybersecurity. The report can be found on
the official ISACA website (ISACA, 2021).
The 2021 report gets the data after doing a macro
survey in the last quarter of 2020 to professionals in
the field, of different nationalities, ages and with dif-
ferent years of experience. Demand is on the rise
and more and more professionals are needed. More
than 60% of respondents describe the situation in their
company’s cybersecurity department as “significantly
understaffed”. The report points out that business un-
derstood from the traditional point of view does not
work well. The cybersecurity workforce is scarce and,
in the future, will probably continue to be scarce, be-
cause it takes a long time to train a professional from
a theoretical point of view.
To conclude, ISACA expects that 2021 will be the
year in which companies will start hiring as many
professionals as there are vacancies to fill. In addi-
tion, it is suggested not to overestimate the effect of
“digitized classes” in education, since the skills that
are most lacking are the interpersonal ones: the soft-
skills.
3 SECURITY AUDIT
FRAMEWORK
This section will look at how the security audit it-
self has been managed. The first step to take when
choosing a methodology is to know which ones there
are and what each of them consists of in brief. The
five most popular ones are the following (Gkoutzama-
nis, 2020): OSSTMM, OWASP Web Security Testing
Guide, NIST SP 800-115, PTES and ISSAF.
3.1 Standardized Frameworks
Regarding the security audit framework itself, OS-
STMM and OWASP Web Security Testing Guide
have been chosen. These two frameworks are de facto
standards in the field of cybersecurity. Unlike PTES
or ISSAF, the first ones on the list are very popular
and are still being updated today. In the case of OS-
STMM, it is particularly effective, because within the
existing general and broad methodologies, it is the
most comprehensive of all, considering aspects that
other guides do not consider, such as the human as-
pect. Regarding the OWASP Web Security Testing
Guide, it is a very popular guide to perform security
audits on web applications. Since the system that will
be audited is a web system, this guide is ideal. For all
these reasons, these are the two frameworks that the
study will be working with.
In addition to the phases, there are different types
of audits. Each of the phases will fall into one of the
three kinds here explained:
• Black Box. This audit is the process that would be
followed by someone totally external to the sys-
tem, who has no prior ideas about how the system
is developed from the inside. This type of audit
simulates the state that a cybercriminal who is go-
ing to attack a system would start from and has to
gradually gather information.
• White Box. This type of audit is the complete op-
posite of the black box audit, as the auditor now
has all the information on how the system is de-
veloped inside and can see the source code. How-
ever, he has no prior knowledge of what attack
vectors he is going to test yet, nor what vulnera-
bilities there may be.
• Grey Box. This type of audit relies on the audi-
tor having partial knowledge of the details of the
system. In fact, it is the type of audit that most
auditors start from: they know what type of sys-
tem they are going to audit in broad strokes. For
example, in the case of the system of this project,
the only previous information before the security
audit was that the system uses an Odoo 11 web
system.
These three types of auditing are not mutually ex-
clusive and are actually performed all at once. Gener-
ally, a passive scan of the application without know-
ing anything (black box) is what goes first and then
goes the specific details (the source code, config-
uration files, platform where the application is de-
ployed...).
After looking at the types of audit, it will be ex-
plained which are the phases that will be developed
during the security audit. These phases have been es-
tablished after combining the OSSTMM framework
and the OWASP framework. In addition to that com-
bination, a new phase is proposed. Such phase re-
ceives the name of “Static analysis” and it aims at
analyzing the source code of the system in order to
discover new vulnerabilities.
The visual representation of the flow of a security
audit can be seen on Figure 1, being “Static analysis”
the highlighted in blue. The phases are:
1. Scope. Definition of the scope and objectives of
the audit. See section 4.1.
2. Social Engineering. Social engineering tech-
niques will be used to try to breach the system
A Practical Experience Applying Security Audit Techniques in an Industrial e-Health System Which Uses an Open Source ERP
483