A Technical Vulnerability Assessment is a key component of an organization’s Risk Assessment and Risk Management programs. Also sometimes described as a Penetration Test, or PENTest, an ecfirst Technical Vulnerability Assessment is broken up into several distinct phases of analysis listed below. Some components are optional based upon the specific organization:
When is the last time your organization conducted a risk analysis activity that included a technical vulnerability assessment?
External Network Penetration Assessment
ecfirst will identify and deeply analyze vulnerabilities within an organization’s Internet-facing infrastructure and attached systems. ecfirst follows a pragmatic approach when conducting a vulnerability assessment or penetration test. This results in a perfected, repeatable process that maximizes information transfer to the client and ensures that all vulnerabilities have been identified.
External Methodology composed of four components
Internal Network Penetration Assessment
ecfirst’s internal network vulnerability assessment will verify that the security controls implemented on an organization’s hosts provide an adequate level of protection against network attacks. The ecfirst security team will scan and validate the security of the network and perform penetration testing against selected hosts. This test will give the organization a thorough understanding of how vulnerable its internal infrastructure is to such threats as disgruntled employees, malicious hackers who gain access to the building, and former employees with “lingering” access, as well as the level of risk should someone compromise an alternative entry point. ecfirst can include many valuable components such as:
The methodology used for the Internal Network Penetration Assessment is similar to that of the external test. The major differentiating factors involve the way our tools and methodologies are used when directly connected to the organization’s network, time windows utilized, and the components listed above.
ecfirst will review the organization’s Internet-facing firewall to identify the current security posture in three critical areas:
Rulebase configuration is critical to the integrity and operating security of a firewall. The rulebase should be tied to business requirements. Every rule that is configured on a firewall is essentially a permissible security hole into the company’s network infrastructure. Each of these rules should have a well defined business need for existing. However, many corporations open rules for testing and never close them when the test has completed. Additionally, many rules are opened up because of then-current business needs, but never closed or repaired once that need, or the corresponding business contract, has ended. This results in legacy access and a vulnerability providing a pathway into the internal network.
Wireless networks are particularly vulnerable to attacks because it is extremely difficult to prevent physical access to them. Wireless networks are subject to both passive and active attacks. A passive attack is one in which an attacker just captures signals flowing from authorized devices, such as a corporate laptop to an authorized Access Point (AP). An active attack is one in which an attacker send signals to the authorized AP in order to solicit specific responses and intrude upon the corporate network, typically, in a very short timeframe.
Social Engineering AssessmentCompanies with excellent security programs often spend large amounts of money on capital purchases to implement technical security controls. However, employees or contractors of the entity often prove to be the weak link in the security chain. Employee and contractor education is a key component to any information security program. Authorized members of the workforce have both authenticated access to information systems as well as physical access to facilities and secured areas. Responsible enterprises assess Human Resources security gaps as well as technical vulnerabilities.
During the social engineering assessment, ecfirst will attempt to gain unauthorized or inappropriate access to facilities, secured areas, documents, credentials, or confidential data. ecfirst security personnel will attempt to bypass security controls that are in-place in order to gain access to various assets. ecfirst will attempt to bypass electronic, personnel, and procedural controls during this assessment.
ecfirst will document and present a very detailed record of successes, failures, controls bypassed, access achieved and information obtained during the assessment. ecfirst will also deliver recommendations for personnel security enhancement needs and security controls requiring improvement or replacement as a part of the final report.
ecfirst combines state of the art tools, the highest credentialed staff, and reporting that maximizes value, efficiency, and information for our clients to deliver the industry’s best Vulnerability Assessments.
ecfirst deploys only highly credentialed and very experienced experts to client sites to perform vulnerability assessments. ecfirst engineers posses certifications such as CISSP, CISA, and CEH and have performed numerous assessments at clients spanning multiple industries. Our engineers understand the sensitivity and criticality of your systems.
Our clients benefit from the most useful reports in the industry. ecfirst provides our clients with descriptive reports that contain real world recommendations. Sections are included for both executive level audiences and the most technical engineer. Executive summaries draw out the most critical and pressing issues for quick comprehension and dissemination.
Please contact John Schelewitz at John.Schelewitz@ecfirst.com or at +1.480.663.3225 to learn more about the ecfirst bizSHIELDtm Technical Vulnerability Assessment solutions to address critical compliance mandates. We would like to understand the regulations that impact your organization as well as your security challenges to determine how ecfirst can augment your efforts to achieve compliance with federal and state mandates..
Talk to us – you will find us to be a partner you can trust.
ecfirst delivers world-class information security and regulatory compliance solutions. With over 2,000+ clients, ecfirst was recognized as an Inc. 500 business – America’s Top 500 Fastest Growing Privately Held Business in 2004 – our first year of eligibility. ecfirst assists organizations with their compliance initiatives for a secure information infrastructure that is compliant with regulations such as HITECH, HIPAA, MARS-E, ISO 27000, or federal and state legislations (such as California or Massachusetts).
ecfirst serves a Who's Who client list that includes technology firms, numerous hospitals, state and county governments, and hundreds of businesses across the United States and abroad. A partial list of clients includes Microsoft, Symantec, HP, McKesson, EMC, IBM, Principal Financial, U.S. Army, U.S. Dept. of Homeland Security, U.S. Dept. of Veterans Affairs and many others.
Talk to ecfirst and you will find an organization that is passionate about the services we deliver and exceptionally devoted to its clients.
We deliver value with intensity and are paranoid about performance for your organization.
For more information, please visit http://www.ecfirst.com/.