Tracer

The true value of an ecfirst Vulnerability Assessment is an effective process to continuously secure your enterprise.

Potential security gaps or flaws can be identified and fixed before they allow intrusion.

A high percentage of risk is from known vulnerabilities, however, thousands of new vulnerabilities are discovered each year affecting software, browsers, operating systems, applications, other IT assets and processes.

ecfirst enables you to gain an awareness of vulnerabilities in your environment to be able to react accordingly.

Vulnerability Assessment outcomes drive remediation prioritization and also smarter, targeted penetration testing.

Vulnerability Assessment

  • External Assessment
    • Examines internet-facing infrastructure, network and systems.
    • Includes, but is not limited to such systems as:
      • Internet or DMZ/perimeter network servers
      • Internet screening routers
      • Internet-facing firewalls
      • E-mail servers
      • DNS servers
      • Servers for storing/processing ePHI
      • Web applications
      • Other systems as required
    • DNS system configuration review
    • Reconnaissance activities related to metadata available in publicly accessible documents and Google Hacking Database entries
    • Web site/application review for issues related to the OWASP Top 10
  • Internal Assessment
    • Identity and Access Management review
    • Password policy and credential review
    • Removable media review
    • SNMP settings
    • SQL server segmentations and access review
    • Networked systems
  • Firewall Assessment
    • Rule-based configuration
    • Operating system, patch revision release levels
    • Security settings review
  • Wireless Assessment
    • Wireless networks are particularly vulnerable to attack due to the inability to prevent physical access. The only advantage is that an attacker had to be in relative physical proximity. Newer antenna technology now permits access from a wider perspective.
      • Location of wireless assessment
      • Discovery of visible wireless access points
      • Identify potentially rogue devices and access points
      • Review of authentication and encryption in use
      • Testing of wireless segmentation
  • Social Engineering Assessment
    • Employees and contractors are often the weakest link of otherwise well-intended security controls. Authorized members of the workforce have authenticated access to information systems, physical access to facilities and secured areas. Physical or electronic exercise to identify gaps to compromise asset.
      • Access testing to facilities, secure areas, documents, credentials, confidential information.
      • Security bypass testing for data access.
      • Includes bypass testing of electronic, personnel and procedural controls.
      • Documentation and report of these exercises, including information obtained.
A proven methodology that addresses the details, conditions, requisites and mandates of each regulatory standard. Vulnerability assessments are part of a bizSHIELDtm program, along with validation, remediation recommendations and implementation timelines. A bizSHIELDtm report is an actionable, documented risk analysis and summary and may be used as evidence for addressing compliance mandates.

  In the News

AI Risk Management with HITRUST Certification, Complimentary Webinar, April 4, 2024

  Events

Technology Predictions Panel Discussion, ISACA, January 17, 2024

  Thought Leadership

Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP), HITRUST Certified CSF Practitioner (CCSFP) is the chief executive of ecfirst, an Inc. 500 business. He is a highly regarded information security and regulatory compliance expert.

Online Store Request a Proposal