Maturity Assessments
Cybersecurity Maturity Assessments
- Small companies looking to bring in independent security advice
- Growing companies looking to raise their security maturity as they scale up
- A new CISO or Head of Security in role looking for an independent review of their security strategy
The following section breaks down the areas of an organisation that we review during a Security Maturity Review:
Security Design
Security Policy – Whilst policies are often seen as the least interesting part of cybersecurity, they are a critical step in designing your organisation’s approach to cybersecurity. We review your policies for completeness and content, to ensure everything is covered and they’re in line with best practices.
Risk Management – Keeping track of all of the issues your organisation has to deal with can be tricky. We review your risk management approach to ensure that it’s broad enough, detailed enough, and risks get appropriately reviewed.
Asset Management – As companies scale, keeping track of all of your equipment gets harder and harder – and you can’t secure what you can’t track. We review your asset management to ensure it’s complete, detailed enough, and considers asset dependencies, security issues, and criticality.
Supply Chain Security – Whether you’re sharing data with them, relying on them for services, or granting them access to your systems – your suppliers can have a significant impact on your organisation’s security, but assessing their level of security can be difficult. We review your supplier security approach to ensure it matches your risk appetite.
Incident Detection
Log Management – Your incident response capability will be significantly hindered if you don’t have an accurate record of what happened when. We review your log management approach to ensure coverage is achieved, the required level of detail is logged, and that logs are stored securely.
Alert Generation – Manually reviewing logs doesn’t scale well, so we review how well your approach automates raising potential security issues to your team. We also check that your alerts cover security events for user accounts, device issues, and network issues.
Behaviour Monitoring – Monitoring user behaviour against an expected baseline allows you to spot more advanced and more subtle aspects of attacks, allowing your organisation to detect attacks earlier in the attack chain and to detect more advanced techniques.
Threat Hunting – We review your team’s capability to proactively search through networks and endpoints for suspicious activity that has previously evaded detection.
Security Implementation
User Account Management – Setting up user accounts is pretty simple, but tracking movers and leavers and ensuring that they have the minimal permissions needed and their accounts are locked after they leave can be tougher.
System Hardening – There’s more to cybersecurity than patches, passwords, and perimeters. Default settings and misconfigurations could still leave your devices at risk of compromise. We review how you lock down your devices.
Vulnerability Management – Ensuring all of your devices are updated and that any discovered security issues are fixed quickly gets harder with scale. We review how you manage data about security issues and how you ensure issues are reviewed and fixed quickly.
Penetration Testing – Penetration Testing is one of the most effective ways to assess your systems security, discover vulnerabilities, and determine the real-world risk of any vulnerabilities that are present. We review your testing approach and ensure your testing approach is appropriate.
Network Access Control – One of the most effective ways to lockdown your systems against physical access risks is network access control, but implementing it well can be tricky.
Network Segmentation – A key step is preventing network propagation of threat actors and malicious software, is network segmentation. We review your segmentation approach to ensure that network attacks are appropriately restricted and that known bypasses have been considered.
Incident Response
Response Planning – Every incident is different, and ensuring that your incident response plan allows you to appropriately triage and respond to a range of incidents is tough. We’ll review your plan to ensure it allows for an effective response to a range of likely scenarios.
Response Testing – Testing your incident response plan against a range if potential scenarios not only ensures the plan is appropriate for those scenarios, but also helps build muscle memory in your response team allowing for a more efficient response when it’s needed.
Backups – There’s a lot to consider when it comes to backing up data; from ensuring that all key data is covered, that it is stored securely, and that you can recovery data quickly.
Recovery Capability – Just because you’ve got good backups doesn’t mean that you’re prepared to deal with a major outage. Everything gets harder with scale and we review your ability to deal with outages of all sizes, from key server failures, to major malicious software infections, to datacentre outages.
Need 24/7 Protection From Cyber Attacks?
We Find Vulneraabilities Before They Are Exploited
We Train You on Real Tools & Scenarios
We Make You Job-Ready
Get in Touch With </Hacker4Help>