Description
Compromise Assessment evaluates an organization’s security posture to determine if a breach has occurred or is actively occurring.
Scope
Phase 1:
Initial Assessment
• File and Operating System Audit
• Network Logs Audit
Phase 2:
Targeted Assessment
• Host Memory Analysis
• Assessment of Security Controls
• Quick Vulnerability & Malware Scan (Endpoint/Servers)
• Hunting for Compromises (Automated & Manual)
Phase 3:
Forensic State Analysis
• Static/Dynamic Memory Forensics Analysis
• Host Disk Forensics
• Network Forensics
Phase 4:
Deliverables
• Executive Summary Report
• Detail Technical Report (Vulnerabilities/Gaps, Risk State, Affected Assets, Evidence, Remediation Guidelines/Recommendations)
Reviews
There are no reviews yet.