Infrastructure Security Health Assessment is focused on assessing the current security controls within your environment, ensuring policy configuration is appropriate, and ensuring that there are no misconfigurations that may lead to an open threat.

CONFIGURATION
The following are incorporated in the assessment:

– Vendor and version checking (known vulnerabilities and/or critical concerns)
– Current infrastructure configuration (cloud, on premise or hybrid)

Base line configuration requirements:

– System Logging and Monitoring
– Backup and Recovery
– Sub-OS hardening status
– User and Admin Access
– CLI query and open port queries.

Security Policies in place incorporating:

– Security Policy structure and definition
– Policy effectiveness (targeted and broad)
– Policy performance and use

This is all amalgamated into a central report that outlines the key concerns in priority and recommended actions necessary.

SERVICE

Infrastructure security health

recon site health services

cyber consulting services

Security maturity development

Security maturity development

Infrastructure security health

Infrastructure security health

Technology assessment + adoption

Technology assessment + adoption

ISO 27001/02 – Readiness Assessment

ISO 27001/02 – Readiness Assessment

Architecture design

Architecture design

Risk management

Risk management

Post breach forensics

Post breach forensics

vCISO

vCISO