SlideShare a Scribd company logo
1 of 1
Download to read offline
Technical Security Assessment Tests:                                                                  Features

                                        ü   Network	
  Security	
  Assessment	
                                                              Tailored	
  Security	
  Audit,	
   Assessment	
  &	
  C ompliance	
  services:
                                        ü   Host	
  Security	
  Assessment	
                                                                 	
  
                                        ü   Web	
  Applica=on	
  Security	
  Assessment	
                                                    ü Simulate	
  real-­‐world	
  a;acks	
  to	
  iden=fy	
  vulnerabili=es	
  and	
  threats	
  	
  
                                        ü   Database	
  Security	
  Assessment	
                                                             ü Deliver	
  priori=zed	
  recommenda=ons	
  for	
  mi=ga=ng	
  iden=fied	
  risks	
  	
  
                                        ü   Penetra=on	
  tes=ng	
  /	
  ethical	
  hacking	
                                                ü Provide	
  best	
  prac=ces	
  for	
  relevant	
  security	
  architecture	
  components	
  
                                        ü   Applica=on	
  Security	
  Assessment	
                                                           ü Iden=fy	
  specific	
  areas	
  of	
  security	
  strengths	
  and	
  weaknesses	
  in	
  the	
  assessed	
  infrastructure	
  	
  	
  
                                        ü   Source	
  code	
  review	
                                                                       ü Provide	
  in-­‐depth	
  knowledge	
  transfer	
  illustra=ng	
  specific	
  vulnerabili=es	
  iden=fied	
  and	
  best	
  prac=ces	
  for	
  remedia=on	
  




                                                                                                                        Enterprise Security
                                                                                                                             Auditing



Security	
  Audit	
  Rollout	
                                                                                                                Benefits
	
                                                                                                                                            	
  
ü Verify	
  the	
  effec=veness	
  of	
  protec=on	
  mechanisms	
  implemented	
  	
                                                         ü     Obtain	
  a	
  clear	
  image	
  of	
  your	
  current	
  exposure	
  
        Network	
  configura=ons	
  	
                                                                                                        ü     Gain	
  visibility	
  of	
  your	
  exploitable	
  weaknesses	
  and	
  vulnerabili=es	
  
        Applica=on	
  security	
  mechanisms	
  	
                                                                                           ü     Obtain	
  o	
  list	
  of	
  recommenda=ons	
  of	
  clear	
  ac=ons	
  towards	
  mi=ga=ng	
  security	
  risks	
  
        Server	
  configura=ons	
  	
                                                                                                         ü     Reduce	
  patching	
  efforts	
  by	
  iden=fying	
  and	
  defining	
  the	
  weaknesses	
  and	
  vulnerabili=es	
  
        Employee	
  security	
  awareness	
  	
                                                                                              ü     Reduce	
  the	
  security	
  risks	
  associated	
  with	
  I T	
  Systems	
  and	
  help	
  demonstrate	
  due	
  diligence	
  
ü Test	
  the	
  ability	
  of	
  system	
  defenders	
  to	
  detect	
  and	
  respond	
  to	
  a;acks	
  	
  
ü Obtain	
  a	
  reliable	
  basis	
  for	
  investments	
  in	
  security	
  personnel	
  and	
  technology	
  	
  
ü Required	
  by	
  I SO	
  27001,	
   P CI	
  D SS	
  etc.	
  	
  
ü As	
  part	
  of	
  risk	
  assessment	
  for	
  risk	
  iden=fica=on	
  and	
  quan=fica=on	
  	
  
ü As	
  part	
  of	
  ongoing/periodic	
  security	
  assessment	
  	
  
ü Before	
  a	
  new	
  system	
  is	
  put	
  in	
  produc=on	
  	
  
ü In	
  the	
  development	
  phase	
  of	
  a	
  new	
  system	
  

More Related Content

What's hot

3 secure design principles
3   secure design principles3   secure design principles
3 secure design principlesdrewz lin
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2Ian Sommerville
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013Ian Sommerville
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013Ian Sommerville
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013Ian Sommerville
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsPivotPointSecurity
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodFalgun Rathod
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodFalgun Rathod
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Seema Sheth-Voss
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013Ian Sommerville
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsPeter Rawsthorne
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012Seema Sheth-Voss
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineeringAHM Pervej Kabir
 
1 page JLS bio
1 page JLS bio1 page JLS bio
1 page JLS bioJim Lynch
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013Ian Sommerville
 
Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Ian Sommerville
 

What's hot (20)

3 secure design principles
3   secure design principles3   secure design principles
3 secure design principles
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013
 
what is security
what is securitywhat is security
what is security
 
Security engineering
Security engineeringSecurity engineering
Security engineering
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
1 page JLS bio
1 page JLS bio1 page JLS bio
1 page JLS bio
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013
 
Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)
 

Viewers also liked

Meazon energy submetering_portfolio
Meazon energy submetering_portfolioMeazon energy submetering_portfolio
Meazon energy submetering_portfolioGiannis Gionas
 
Presentaciónimpactos ambientales
Presentaciónimpactos ambientalesPresentaciónimpactos ambientales
Presentaciónimpactos ambientalesnanidiliz
 
Assure methods for lesson two
Assure methods for lesson twoAssure methods for lesson two
Assure methods for lesson twojkayleejo
 
Reducir, reutilizar e reciclar anxo miguel
Reducir, reutilizar e reciclar  anxo miguelReducir, reutilizar e reciclar  anxo miguel
Reducir, reutilizar e reciclar anxo miguelCasillas1
 
La metodología de la investigación se considera como disciplina que elabora
La metodología de la investigación se considera como disciplina que elaboraLa metodología de la investigación se considera como disciplina que elabora
La metodología de la investigación se considera como disciplina que elaboranelson soluciones
 
Aprenda box y artes marciales
Aprenda box y artes marcialesAprenda box y artes marciales
Aprenda box y artes marcialesmegaradioexpress
 
Análisis comparativo
Análisis comparativoAnálisis comparativo
Análisis comparativoYeylin26
 
Agenda per qui no te
Agenda per qui no teAgenda per qui no te
Agenda per qui no teAsun Vidal
 
Paralelo de 10
Paralelo de 10Paralelo de 10
Paralelo de 10camic16
 
Ancillary 1 2manydjs
Ancillary 1   2manydjsAncillary 1   2manydjs
Ancillary 1 2manydjsyahalex
 
Silvia doña presentación tfm
Silvia doña   presentación tfmSilvia doña   presentación tfm
Silvia doña presentación tfmSilvia Doña
 

Viewers also liked (20)

Viajes por el mundo
Viajes por el mundoViajes por el mundo
Viajes por el mundo
 
Semeando vida
Semeando vidaSemeando vida
Semeando vida
 
Meazon energy submetering_portfolio
Meazon energy submetering_portfolioMeazon energy submetering_portfolio
Meazon energy submetering_portfolio
 
Presentaciónimpactos ambientales
Presentaciónimpactos ambientalesPresentaciónimpactos ambientales
Presentaciónimpactos ambientales
 
Assure methods for lesson two
Assure methods for lesson twoAssure methods for lesson two
Assure methods for lesson two
 
Cuanto de fisisca
Cuanto de fisiscaCuanto de fisisca
Cuanto de fisisca
 
Fair trade
Fair tradeFair trade
Fair trade
 
Reducir, reutilizar e reciclar anxo miguel
Reducir, reutilizar e reciclar  anxo miguelReducir, reutilizar e reciclar  anxo miguel
Reducir, reutilizar e reciclar anxo miguel
 
La metodología de la investigación se considera como disciplina que elabora
La metodología de la investigación se considera como disciplina que elaboraLa metodología de la investigación se considera como disciplina que elabora
La metodología de la investigación se considera como disciplina que elabora
 
Vacunas
VacunasVacunas
Vacunas
 
Aprenda box y artes marciales
Aprenda box y artes marcialesAprenda box y artes marciales
Aprenda box y artes marciales
 
Ex. proyecto 7 español 9
Ex. proyecto 7   español 9Ex. proyecto 7   español 9
Ex. proyecto 7 español 9
 
Análisis comparativo
Análisis comparativoAnálisis comparativo
Análisis comparativo
 
Agenda per qui no te
Agenda per qui no teAgenda per qui no te
Agenda per qui no te
 
Paralelo de 10
Paralelo de 10Paralelo de 10
Paralelo de 10
 
Pensamiento crítico
Pensamiento críticoPensamiento crítico
Pensamiento crítico
 
Ancillary 1 2manydjs
Ancillary 1   2manydjsAncillary 1   2manydjs
Ancillary 1 2manydjs
 
Online module 2
Online module 2Online module 2
Online module 2
 
Coca cola
Coca colaCoca cola
Coca cola
 
Silvia doña presentación tfm
Silvia doña   presentación tfmSilvia doña   presentación tfm
Silvia doña presentación tfm
 

Similar to Enterprise security auditing

Enterprise security assessment types
Enterprise security assessment typesEnterprise security assessment types
Enterprise security assessment typesBob Resmerita
 
Apollo Infoways Profile
Apollo Infoways ProfileApollo Infoways Profile
Apollo Infoways ProfileRavi Prakash
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous DeliveryTom Stiehm
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Donald E. Hester
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentationdanphilpott
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoonNASAPMC
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Ian Sommerville
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_dsArun Gopinath
 
Application Security
Application SecurityApplication Security
Application Securityonenolesguy
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGArul Nambi
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Craig Martin
 
1303 independent risk assessments
1303 independent risk assessments1303 independent risk assessments
1303 independent risk assessmentsJenny Reid
 
Ta Security
Ta SecurityTa Security
Ta Securityjothsna
 
TA security
TA securityTA security
TA securitykesavars
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudTjylen Veselyj
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operationsPiyush Jain
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Ian Sommerville
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...CODE BLUE
 
20[1].03.Simplified Security
20[1].03.Simplified Security20[1].03.Simplified Security
20[1].03.Simplified Securityravichar
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011Ola Odejayi
 

Similar to Enterprise security auditing (20)

Enterprise security assessment types
Enterprise security assessment typesEnterprise security assessment types
Enterprise security assessment types
 
Apollo Infoways Profile
Apollo Infoways ProfileApollo Infoways Profile
Apollo Infoways Profile
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Application Security
Application SecurityApplication Security
Application Security
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
1303 independent risk assessments
1303 independent risk assessments1303 independent risk assessments
1303 independent risk assessments
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
20[1].03.Simplified Security
20[1].03.Simplified Security20[1].03.Simplified Security
20[1].03.Simplified Security
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011
 

Enterprise security auditing

  • 1. Technical Security Assessment Tests: Features ü Network  Security  Assessment   Tailored  Security  Audit,   Assessment  &  C ompliance  services: ü Host  Security  Assessment     ü Web  Applica=on  Security  Assessment   ü Simulate  real-­‐world  a;acks  to  iden=fy  vulnerabili=es  and  threats     ü Database  Security  Assessment   ü Deliver  priori=zed  recommenda=ons  for  mi=ga=ng  iden=fied  risks     ü Penetra=on  tes=ng  /  ethical  hacking   ü Provide  best  prac=ces  for  relevant  security  architecture  components   ü Applica=on  Security  Assessment   ü Iden=fy  specific  areas  of  security  strengths  and  weaknesses  in  the  assessed  infrastructure       ü Source  code  review   ü Provide  in-­‐depth  knowledge  transfer  illustra=ng  specific  vulnerabili=es  iden=fied  and  best  prac=ces  for  remedia=on   Enterprise Security Auditing Security  Audit  Rollout   Benefits     ü Verify  the  effec=veness  of  protec=on  mechanisms  implemented     ü Obtain  a  clear  image  of  your  current  exposure     Network  configura=ons     ü Gain  visibility  of  your  exploitable  weaknesses  and  vulnerabili=es     Applica=on  security  mechanisms     ü Obtain  o  list  of  recommenda=ons  of  clear  ac=ons  towards  mi=ga=ng  security  risks     Server  configura=ons     ü Reduce  patching  efforts  by  iden=fying  and  defining  the  weaknesses  and  vulnerabili=es     Employee  security  awareness     ü Reduce  the  security  risks  associated  with  I T  Systems  and  help  demonstrate  due  diligence   ü Test  the  ability  of  system  defenders  to  detect  and  respond  to  a;acks     ü Obtain  a  reliable  basis  for  investments  in  security  personnel  and  technology     ü Required  by  I SO  27001,   P CI  D SS  etc.     ü As  part  of  risk  assessment  for  risk  iden=fica=on  and  quan=fica=on     ü As  part  of  ongoing/periodic  security  assessment     ü Before  a  new  system  is  put  in  produc=on     ü In  the  development  phase  of  a  new  system