Services

COMPLIANCE ASSESSMENT

Assessment of a business system’s adherence to industry cybersecurity controls

  • Focus:  
    • Identify system design vs implementation
    • Identify system policy failures
    • Identify adherence to cybersecurity controls

VULNERABILITY ASSESSMENT

Process that defines, identifies, and classifies the security weaknesses in a computer, network, or communications infrastructure.

  • Focus:  
    • Evaluate the overall security posture of the system
    • Determine the mission impact of the vulnerabilities if not mitigated
    • Provide remediation techniques

PENETRATION TEST

Systematic process of subverting system protections in order to obtain access, further access or destroy mission capabilities.

  • Focus:  
    • Identify how an adversary might gain access to the system or affect mission system
    • Identify potential for compromise/spread given an active threat
    • Identify impact to operations