Compromise Assessment



Compromise Assessment evaluates an organization’s security posture to determine if a breach has occurred or is actively occurring.



Phase 1:
Initial Assessment
• File and Operating System Audit
• Network Logs Audit

Phase 2:
Targeted Assessment
• Host Memory Analysis
• Assessment of Security Controls
• Quick Vulnerability & Malware Scan (Endpoint/Servers)
• Hunting for Compromises (Automated & Manual)

Phase 3:
Forensic State Analysis
• Static/Dynamic Memory Forensics Analysis
• Host Disk Forensics
• Network Forensics

Phase 4:

• Executive Summary Report
• Detail Technical Report (Vulnerabilities/Gaps, Risk State, Affected Assets, Evidence, Remediation Guidelines/Recommendations)


There are no reviews yet.

Be the first to review “Compromise Assessment”

Your email address will not be published. Required fields are marked *