Description
The process of identifying, quantifying and prioritizing the weakness in the system at customers’ network.
Scope
Phase 1
• Assets Discovery
• Vulnerability Scanning
• Vulnerability Verification
• Removing false positive & Validations
Deliverables
Technical report, attack/vulnerability impact with mitigations guidelines/recommendations, revalidation test (if required), advisory
Reviews
There are no reviews yet.