SlideShare a Scribd company logo
1 of 1
Download to read offline
Technical Security Assessment Tests:                                                                  Features

                                        ü   Network	
  Security	
  Assessment	
                                                              Tailored	
  Security	
  Audit,	
   Assessment	
  &	
  C ompliance	
  services:
                                        ü   Host	
  Security	
  Assessment	
                                                                 	
  
                                        ü   Web	
  Applica=on	
  Security	
  Assessment	
                                                    ü Simulate	
  real-­‐world	
  a;acks	
  to	
  iden=fy	
  vulnerabili=es	
  and	
  threats	
  	
  
                                        ü   Database	
  Security	
  Assessment	
                                                             ü Deliver	
  priori=zed	
  recommenda=ons	
  for	
  mi=ga=ng	
  iden=fied	
  risks	
  	
  
                                        ü   Penetra=on	
  tes=ng	
  /	
  ethical	
  hacking	
                                                ü Provide	
  best	
  prac=ces	
  for	
  relevant	
  security	
  architecture	
  components	
  
                                        ü   Applica=on	
  Security	
  Assessment	
                                                           ü Iden=fy	
  specific	
  areas	
  of	
  security	
  strengths	
  and	
  weaknesses	
  in	
  the	
  assessed	
  infrastructure	
  	
  	
  
                                        ü   Source	
  code	
  review	
                                                                       ü Provide	
  in-­‐depth	
  knowledge	
  transfer	
  illustra=ng	
  specific	
  vulnerabili=es	
  iden=fied	
  and	
  best	
  prac=ces	
  for	
  remedia=on	
  




                                                                                                                        Enterprise Security
                                                                                                                             Auditing



Security	
  Audit	
  Rollout	
                                                                                                                Benefits
	
                                                                                                                                            	
  
ü Verify	
  the	
  effec=veness	
  of	
  protec=on	
  mechanisms	
  implemented	
  	
                                                         ü     Obtain	
  a	
  clear	
  image	
  of	
  your	
  current	
  exposure	
  
        Network	
  configura=ons	
  	
                                                                                                        ü     Gain	
  visibility	
  of	
  your	
  exploitable	
  weaknesses	
  and	
  vulnerabili=es	
  
        Applica=on	
  security	
  mechanisms	
  	
                                                                                           ü     Obtain	
  o	
  list	
  of	
  recommenda=ons	
  of	
  clear	
  ac=ons	
  towards	
  mi=ga=ng	
  security	
  risks	
  
        Server	
  configura=ons	
  	
                                                                                                         ü     Reduce	
  patching	
  efforts	
  by	
  iden=fying	
  and	
  defining	
  the	
  weaknesses	
  and	
  vulnerabili=es	
  
        Employee	
  security	
  awareness	
  	
                                                                                              ü     Reduce	
  the	
  security	
  risks	
  associated	
  with	
  I T	
  Systems	
  and	
  help	
  demonstrate	
  due	
  diligence	
  
ü Test	
  the	
  ability	
  of	
  system	
  defenders	
  to	
  detect	
  and	
  respond	
  to	
  a;acks	
  	
  
ü Obtain	
  a	
  reliable	
  basis	
  for	
  investments	
  in	
  security	
  personnel	
  and	
  technology	
  	
  
ü Required	
  by	
  I SO	
  27001,	
   P CI	
  D SS	
  etc.	
  	
  
ü As	
  part	
  of	
  risk	
  assessment	
  for	
  risk	
  iden=fica=on	
  and	
  quan=fica=on	
  	
  
ü As	
  part	
  of	
  ongoing/periodic	
  security	
  assessment	
  	
  
ü Before	
  a	
  new	
  system	
  is	
  put	
  in	
  produc=on	
  	
  
ü In	
  the	
  development	
  phase	
  of	
  a	
  new	
  system	
  

More Related Content

What's hot

3 secure design principles
3   secure design principles3   secure design principles
3 secure design principles
drewz lin
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
Ian Sommerville
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013
Ian Sommerville
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
Pramod Yadav
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013
Ian Sommerville
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
Ian Sommerville
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
Seema Sheth-Voss
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013
Ian Sommerville
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012
Seema Sheth-Voss
 
1 page JLS bio
1 page JLS bio1 page JLS bio
1 page JLS bio
Jim Lynch
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013
Ian Sommerville
 
Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)
Ian Sommerville
 

What's hot (20)

3 secure design principles
3   secure design principles3   secure design principles
3 secure design principles
 
CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2CS5032 L20 cybersecurity 2
CS5032 L20 cybersecurity 2
 
CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013CS 5032 L2 dependability and security 2013
CS 5032 L2 dependability and security 2013
 
Pramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center ManagerPramod Yadav_Security Operations Center Manager
Pramod Yadav_Security Operations Center Manager
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013CS 5032 L6 reliability and security specification 2013
CS 5032 L6 reliability and security specification 2013
 
CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013CS 5032 L5 safety specification 2013
CS 5032 L5 safety specification 2013
 
Network Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision PointsNetwork Vulnerability Assessment: Key Decision Points
Network Vulnerability Assessment: Key Decision Points
 
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun RathodOpen Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
Open Source Security Testing Methodology Manual - OSSTMM by Falgun Rathod
 
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 
CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013CS 5032 L8 dependability engineering 2 2013
CS 5032 L8 dependability engineering 2 2013
 
what is security
what is securitywhat is security
what is security
 
Security engineering
Security engineeringSecurity engineering
Security engineering
 
Defence in Depth Architectural Decisions
Defence in Depth Architectural DecisionsDefence in Depth Architectural Decisions
Defence in Depth Architectural Decisions
 
Core security utcpresentation962012
Core security utcpresentation962012Core security utcpresentation962012
Core security utcpresentation962012
 
Software security engineering
Software security engineeringSoftware security engineering
Software security engineering
 
1 page JLS bio
1 page JLS bio1 page JLS bio
1 page JLS bio
 
CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013CS 5032 L7 dependability engineering 2013
CS 5032 L7 dependability engineering 2013
 
Security testing (CS 5032 2012)
Security testing (CS 5032 2012)Security testing (CS 5032 2012)
Security testing (CS 5032 2012)
 

Viewers also liked

African american series 009
African american series 009African american series 009
African american series 009
gww_victoria
 

Viewers also liked (16)

CURSO VIRTUAL
CURSO VIRTUALCURSO VIRTUAL
CURSO VIRTUAL
 
Rg 1360
Rg 1360Rg 1360
Rg 1360
 
Curriculunm taty
Curriculunm tatyCurriculunm taty
Curriculunm taty
 
Rg 2188
Rg 2188Rg 2188
Rg 2188
 
НДС-2-15. Куницын Д.В.
НДС-2-15. Куницын Д.В.НДС-2-15. Куницын Д.В.
НДС-2-15. Куницын Д.В.
 
VCampus verano Basket77-Clavijo
VCampus verano Basket77-ClavijoVCampus verano Basket77-Clavijo
VCampus verano Basket77-Clavijo
 
Pag23
Pag23Pag23
Pag23
 
Las relaciones públicas
Las relaciones públicasLas relaciones públicas
Las relaciones públicas
 
Pag12
Pag12Pag12
Pag12
 
African american series 009
African american series 009African american series 009
African american series 009
 
Rg 2020
Rg 2020Rg 2020
Rg 2020
 
Welzijnsindicatoren - Key Perfomance Indicatoren
Welzijnsindicatoren - Key Perfomance IndicatorenWelzijnsindicatoren - Key Perfomance Indicatoren
Welzijnsindicatoren - Key Perfomance Indicatoren
 
Αρωματικά & Φαρμακευτικά Φυτά
Αρωματικά & Φαρμακευτικά ΦυτάΑρωματικά & Φαρμακευτικά Φυτά
Αρωματικά & Φαρμακευτικά Φυτά
 
Istafind pitch
Istafind pitchIstafind pitch
Istafind pitch
 
Встречайте — ВКонтакте
Встречайте — ВКонтактеВстречайте — ВКонтакте
Встречайте — ВКонтакте
 
Program lojalnościowy balajcza 2015
Program lojalnościowy balajcza 2015Program lojalnościowy balajcza 2015
Program lojalnościowy balajcza 2015
 

Similar to Enterprise security auditing

Enterprise security assessment types
Enterprise security assessment typesEnterprise security assessment types
Enterprise security assessment types
Bob Resmerita
 
Apollo Infoways Profile
Apollo Infoways ProfileApollo Infoways Profile
Apollo Infoways Profile
Ravi Prakash
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
NASAPMC
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
Ian Sommerville
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
Arun Gopinath
 
Application Security
Application SecurityApplication Security
Application Security
onenolesguy
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Craig Martin
 
Ta Security
Ta SecurityTa Security
Ta Security
jothsna
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
CODE BLUE
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011
Ola Odejayi
 

Similar to Enterprise security auditing (20)

Enterprise security assessment types
Enterprise security assessment typesEnterprise security assessment types
Enterprise security assessment types
 
Apollo Infoways Profile
Apollo Infoways ProfileApollo Infoways Profile
Apollo Infoways Profile
 
Integrating security into Continuous Delivery
Integrating security into Continuous DeliveryIntegrating security into Continuous Delivery
Integrating security into Continuous Delivery
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
DojoSec FISMA Presentation
DojoSec FISMA PresentationDojoSec FISMA Presentation
DojoSec FISMA Presentation
 
Dezfuli.homayoon
Dezfuli.homayoonDezfuli.homayoon
Dezfuli.homayoon
 
Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)Security Engineering 1 (CS 5032 2012)
Security Engineering 1 (CS 5032 2012)
 
Ibm app security assessment_ds
Ibm app security assessment_dsIbm app security assessment_ds
Ibm app security assessment_ds
 
Application Security
Application SecurityApplication Security
Application Security
 
ISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTINGISO 27001 - IMPLEMENTATION CONSULTING
ISO 27001 - IMPLEMENTATION CONSULTING
 
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
Risk-driven and Business-outcome-focused Enterprise Security Architecture Fra...
 
1303 independent risk assessments
1303 independent risk assessments1303 independent risk assessments
1303 independent risk assessments
 
Ta Security
Ta SecurityTa Security
Ta Security
 
TA security
TA securityTA security
TA security
 
Cloud Security vs Security in the Cloud
Cloud Security vs Security in the CloudCloud Security vs Security in the Cloud
Cloud Security vs Security in the Cloud
 
Security architecture, engineering and operations
Security architecture, engineering and operationsSecurity architecture, engineering and operations
Security architecture, engineering and operations
 
Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)Safety specification (CS 5032 2012)
Safety specification (CS 5032 2012)
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
20[1].03.Simplified Security
20[1].03.Simplified Security20[1].03.Simplified Security
20[1].03.Simplified Security
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011
 

Enterprise security auditing

  • 1. Technical Security Assessment Tests: Features ü Network  Security  Assessment   Tailored  Security  Audit,   Assessment  &  C ompliance  services: ü Host  Security  Assessment     ü Web  Applica=on  Security  Assessment   ü Simulate  real-­‐world  a;acks  to  iden=fy  vulnerabili=es  and  threats     ü Database  Security  Assessment   ü Deliver  priori=zed  recommenda=ons  for  mi=ga=ng  iden=fied  risks     ü Penetra=on  tes=ng  /  ethical  hacking   ü Provide  best  prac=ces  for  relevant  security  architecture  components   ü Applica=on  Security  Assessment   ü Iden=fy  specific  areas  of  security  strengths  and  weaknesses  in  the  assessed  infrastructure       ü Source  code  review   ü Provide  in-­‐depth  knowledge  transfer  illustra=ng  specific  vulnerabili=es  iden=fied  and  best  prac=ces  for  remedia=on   Enterprise Security Auditing Security  Audit  Rollout   Benefits     ü Verify  the  effec=veness  of  protec=on  mechanisms  implemented     ü Obtain  a  clear  image  of  your  current  exposure     Network  configura=ons     ü Gain  visibility  of  your  exploitable  weaknesses  and  vulnerabili=es     Applica=on  security  mechanisms     ü Obtain  o  list  of  recommenda=ons  of  clear  ac=ons  towards  mi=ga=ng  security  risks     Server  configura=ons     ü Reduce  patching  efforts  by  iden=fying  and  defining  the  weaknesses  and  vulnerabili=es     Employee  security  awareness     ü Reduce  the  security  risks  associated  with  I T  Systems  and  help  demonstrate  due  diligence   ü Test  the  ability  of  system  defenders  to  detect  and  respond  to  a;acks     ü Obtain  a  reliable  basis  for  investments  in  security  personnel  and  technology     ü Required  by  I SO  27001,   P CI  D SS  etc.     ü As  part  of  risk  assessment  for  risk  iden=fica=on  and  quan=fica=on     ü As  part  of  ongoing/periodic  security  assessment     ü Before  a  new  system  is  put  in  produc=on     ü In  the  development  phase  of  a  new  system