|
external vulnerability assessment
manual validation
penetration testing
practical remediation advice
|
External |
|
|
blind assessment
reconnaissance
cyber-attack surface minimization
chatter analysis
reputation/infection analysis
|
|
Simulated DDoS
breaking point analysis
performance degradation analysis
DDoS prevention validation
latency
throughput
|
|
Configuration review
log analysis
data analytics
|
External/Internal |
|
User/guest wireless assessment
encryption strength
auth strength
rogue access points
wireless segregation
wireless infrastructure vulnerabilities
|
|
Application testing
outside attackers
authorized users
privilege escalation
account hijacking
credentialed testing
|
|
Security best-practices assessment
configuration policy review
manual reviews of configurations
|
|
internal vulnerability assessment
manual validation
penetration testing
practical remediation advice
|
Internal |
|
internal vulnerability assessment
manual validation
penetration testing
practical remediation advice
|
|
Configuration scoring
configuration benchmarking
manual review
feature analysis
security ROI
|
Platform-specific |
|
GPO settings analysis
manual review
review of users
review of groups
review of service accounts
|
|
Analysis of registry settings
manual review
review of enabled services
review of installed programs
|
|
Analysis of config files/settings
manual review
review of running processes
review of installed packages
review of patch levels
|
|
Virtualization configuration review
|
|
Social engineering
simulated attacks
phishing
pretext calling
social networking
|
Organizational |
|
Policy review
Procedures review
Practices review
documentation review
IT interviews
gap analysis
compliance
best-practices
regulatory requirements
|
|
Top-down
strategic
Risk assessment
asset inventory
vulnerability analysis
threat model
|
|
Physical security
walkthroughs
facilities
properties
|
|
Data loss prevention
Traffic monitoring
spidering
file searches
|
|
Penetration testing
black box
capture-the-flag
blind
social engineering
technical pen testing
|
Other |
|
Custom assessment
|