Information Security Services

Similar documents
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

SECURITY. Risk & Compliance Services

Passing PCI Compliance How to Address the Application Security Mandates

Overview. Figure 1 - Penetration testing screenshot examples showing (i) PACS image and (ii) breached Electronic Health Record system

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Security-as-a-Service (Sec-aaS) Framework. Service Introduction

Managing IT Security with Penetration Testing

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Cyber Security Management

Rational AppScan & Ounce Products

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Penetration Testing //Vulnerability Assessment //Remedy

Penetration Testing Report Client: Business Solutions June 15 th 2015

How To Test For Security On A Network Without Being Hacked

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Payment Card Industry Data Security Standard

Presented by Evan Sylvester, CISSP

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Guide to Vulnerability Management for Small Companies

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Course Title: Penetration Testing: Network & Perimeter Testing

Protecting against cyber threats and security breaches

Click to edit Master title style

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

Security Testing. Vulnerability Assessment vs Penetration Testing. Gabriel Mihai Tanase, Director KPMG Romania. 29 October 2014

Introduction to Cyber Security / Information Security

Network Security Audit. Vulnerability Assessment (VA)

Cisco Security Optimization Service

Reducing Application Vulnerabilities by Security Engineering

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Penetration Testing in Romania

Cybersecurity The role of Internal Audit

A Decision Maker s Guide to Securing an IT Infrastructure

Enterprise Computing Solutions

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Penetration testing & Ethical Hacking. Security Week 2014

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

KEY STEPS FOLLOWING A DATA BREACH

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Effective Software Security Management

Critical Controls for Cyber Security.

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

FACT SHEET: Ransomware and HIPAA

SANS Top 20 Critical Controls for Effective Cyber Defense

How To Protect Yourself From A Hacker Attack

Professional Services Overview

Data Security: Fight Insider Threats & Protect Your Sensitive Data

PENETRATION TESTING GUIDE. 1

External Supplier Control Requirements

SecurityMetrics Vision whitepaper

Professional Penetration Testing Techniques and Vulnerability Assessment ...

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

CloudCheck Compliance Certification Program

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Penetration Testing Services. Demonstrate Real-World Risk

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

White Paper. Information Security -- Network Assessment

Penetration Testing. Presented by

Penetration Test Report

Information Security and Risk Management

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

e-discovery Forensics Incident Response

IT Security Testing Services

SECURITY FIRST: AN ESSENTIAL GUIDE TO PENETRATION TESTING

Information Security. Training

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

A Case for Managed Security

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

What is Penetration Testing?

WhiteHat Security White Paper. Top 11 PCI DSS 3.0 Changes That Will Affect Your Application Security Program

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Overcoming PCI Compliance Challenges

NATIONAL CYBER SECURITY AWARENESS MONTH

Chapter 1 The Principles of Auditing 1

External Network Penetration Test Report

About Effective Penetration Testing Methodology

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Cyber Security An Exercise in Predicting the Future

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

SPEAR PHISHING UNDERSTANDING THE THREAT

Defending Against Data Beaches: Internal Controls for Cybersecurity

Where every interaction matters.

YOUR HIPAA RISK ANALYSIS IN FIVE STEPS

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

Application Security in the Software Development Lifecycle

Transcription:

Information Security Services

Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual property data theft, and over 552 million data leaks including credit card numbers, medical records, home addresses, passwords, financial information, and other personal information. Given the complexity of most networks, many have unpatched security vulnerabilities that, if exploited, can have devastating effects on company operations and a severe long-term financial impact. Regular security assessments and penetration tests are therefore a necessity to protect corporate and customer data from online threats. Our security team has over 22 years of hands-on penetration testing and vulnerability analysis experience, offering a level of protection superior to many competitors who often only run simple automated scans. Through the use of unique in-house tools combined with extensive experience and adherence to industry standard guidelines (NIST, OWASP), we are able to keep our clients data secure from threats. SECURITY IS A PROCESS, NOT A PRODUCT. - BRUCE SCHNEIER Following this philosophy, we offer discounted pricing for quarterly application security assessments for those clients who require the highest degrees of security. Mobile Application Assessment The popularity of mobile devices has created an excellent new way for companies to offer value to their consumers through the use of mobile applications. However, the main focus during the development cycle is usually the user experience, and proper security is rarely ever implemented. As seen previously, this will result in customer data loss, and in some cases provide a way into the main corporate network through improper configuration of backend services. Depending on the application being assessed, Acumen s security detail first creates a compliance checklist, followed by a full run time binary analysis as well as a thorough code review. This results in a comprehensive report identifying the vulnerabilities found along with a detailed risk assessment for each. Acumen s expertise as a world-class application developer places us years ahead of our competition in this field. For more information on mobile security threats, please refer to our Security Threats and Audit Techniques for Mobile Devices paper. Web Application Assessment Our Web application security assessment consists of a comprehensive evaluation of the security status of a web application. These include cloud services, online stores, payment processing systems, banking web portals, amongst others. Given the complexity and diversity of many web Acumen Innovations Information Security Services 1

applications, this service is highly customized for each client. The assessment consists of a careful study of the structure and flow of the application, identifying logic flaws, improper input sanitization, correct session management, correct cryptographic implementation, vulnerabilities in software used, system level assessment and much more. At the end of the assessment, a thorough report will be delivered which will include all the vulnerabilities found along with a risk rating for each, and possible ways to fix the issues. This type of assessment will do the following: Reveal security vulnerabilities resulting from implementation flaws Expose flaws in outdated back end services and software Assess the likelihood of different attacks Assess security impacts if the application is breached Increase client confidence in the application s overall security Source Code Audit Much like a mobile application code audit, our security engineers will review the source code to identify weaknesses. The audit will include: Review of authentication, authorization, and session management procedures. Identification of memory safety issues such as buffer overflows/underflows Review of proper mechanisms to secure sensitive data Validations of proper cryptographic protocols such as correct implementation of hashing algorithms, symmetric vs asymmetric protocols, secure communications and more. Internal Vulnerability Assessment During an internal vulnerability assessment, Acumen engineers identify attack vectors coming from within the network. Rather than examine vulnerabilities coming from outside the network, this type of assessment examines weaknesses that may be exploited by someone within such as an employee, a guest, or a breach in the wireless systems. Some of the areas of focus include the following: Packet traffic monitoring, focusing on credentials and insecurely transmitted confidential information. Proper security policies to restrict access to sensitive information such as creation and use of restricted accounts. Privilege escalation exploits enabling a restricted user to gain more privileged roles such as system administrator through common operating system and software vulnerabilities. Internal password policies and compliance. Acumen Innovations Information Security Services 2

Penetration Testing Reconnaissance Exploitation Privilege escalation Reporting Penetration testing is the most advanced security assessment offered. There are two types of penetration tests, external (black box) and internal (white box). An external penetration test, the most common type offered, simulates a real-world attack from a malicious hacker or group of hackers with no inside knowledge of the organization. It differs from a vulnerability assessment in that ethical hacking techniques are used to attempt to exploit the vulnerabilities found in the client s systems in order to measure the severity of these security weaknesses. The difference between a real attacker and our security analysts are the permissions given and the detailed scope of work agreed upon before starting the test. The objective of this exercise is to first identify if an external attacker can infiltrate the network, and if done, what information would be available and what level of access can be achieved. False positives are eliminated and a Business Impact Analysis is conducted. An internal penetration test simulates a malicious attack from an individual with some level of authorized access or who has obtained network access. This test is done in conjunction with the targeted organization s IT team and, since it is carried out internally with the IT team, it is essentially an internal security audit of the targeted organization s security architecture and provides excellent value to a client striving to build a strong, effective cyber security defense posture. We recommend an internal penetration test to every company that has only implemented perimeter defense measures to protect their IT infrastructure, since bypassing these defenses in various ways is always a possibility. Penetration testing requires a high level of expertise and knowledge in order to be successful, going far beyond anything any automated tool can provide. In most cases, a successful penetration tester will have to write custom exploits; thus, extensive programming knowledge and experience are needed. Although the exact scope and length of each test varies, most external penetration tests are divided into the following areas: RECONNAISSANCE: Usually the longest part of a penetration test, the main focus of this stage is to gather as much information about the target as possible. No exploitation is done during this phase. Company information gathering including key personnel Firewall, IDS, IPS identification and evasion Servers in the DMZ including Routers, DNS, SMTP and more Identification of running operating systems, services and associated exploits Web and mobile application vulnerability identification Physical location entry points and wireless identification. Acumen Innovations Information Security Services 3

VULNERABILITY TESTING AND EXPLOITATION: During this stage, our staff will use all the information gathered during the reconnaissance phase in order to come up with attack vectors. This will include: Creating custom password lists to brute force password authenticated systems. Conducting strategic social engineering attacks such as targeted phishing to compromise an internal user. Creating custom exploits where required for discovered flaws. Conducting wireless attacks such as evil twins, Man in the middle, exploiting outdated encryption standards and carrying out attacks against new encryptions. Conducting client side attacks PRIVILEGE ESCALATION: Once inside the network, the next step is to move around and escalate to more privilege user accounts in order to have unrestricted access to the systems. At this stage in the test the systems have been compromised, and the next step is to seek out sensitive information. This is done by: Monitoring network traffic packets. Pivoting inside the network, looking for different systems. Exploiting OS and software flaws CLEANUP AND REPORTING: The final stage of the penetration test includes removing any files including shells, key loggers and other tools used by our staff during the attack. Finally, the most important part of the assessment is carried out: the Audit Report. This report will include: A detailed step-by-step guide on how the attack was carried out The vulnerabilities identified and exploited, along with Proof of Concept exploit code where applicable. A complete risk and threat rating for each vulnerability identified and exploit carried out, taking into account exploit complexity. A list of improvements and recommended security updates, including account and password policy review, recommended OS/Software update patches with a priority ranking, and more. Regulatory Compliance Regulatory compliance is a cumbersome endeavor that seriously affects a business operations. Protecting corporate and customer information is critical in order to meet the regulatory compliance requirements in place today. Increasing penalties and reputational damage due to non-compliance have turned this task into a major issue for many organizations. Pressures from regulators loom over businesses of all sizes. Corporate regulatory compliance issues can be complex and highly time-consuming. The substantial penalties imposed for noncompliance mean avoiding the issue is not a feasible option for a business. Therefore, addressing the issue effectively is critical. Acumen Innovations Information Security Services 4

We provide our clients with expertise in dealing with regulatory compliance requirements. We will identify regulations applicable to your organization and manage the process of achieving compliance. In addition, our team will provide insights on the regulatory process, and the best methods to ensure to do not fall into non-compliance at a later date. We can assist you in achieving regulatory compliance in the following areas: Sarbanes Oxley Act (SOX) Health Insurance Portability and Accountability Act (HIPAA) Health Information Technology for Economic and Clinical Health Act (HITECH) Information Security Program Development Most organizations are not adequately prepared to respond to incidents that threaten the unimpeded operations of their business. Security breaches that lead to the loss of critical systems, processes, or data can send an organization in a rapid downward spiral. In the current threat landscape, a plan that enables a business to rapidly and effectively recover from downtime and assist in avoiding disaster is not a luxury but rather a critical success factor for business continuity. We provide information security program development consulting services that assist organizations in developing flexible and comprehensive solutions that maintain the availability of their information system infrastructure, critical data and core business processes in the event of a security incident. The purpose of an information security program is the management and governance of IT security architecture in order to reduce security risk so organizations are able to fulfill their core business functions without hindrance. Proper governance must be implemented to ensure that proactive controls are implemented in a cost-efficient manner. Program management will identify and assign key security roles and responsibilities. This extends to policy development, oversight, and monitoring activities. Throughout the process, new and evolving IT security risks and threats must also be addressed. We will help your organization establish and maintain a framework with a concomitant management structure and clear roles and responsibilities. We work with you to develop information security strategies that are in alignment with your business objectives and any applicable laws and regulations in order to optimize risk management. In establishing a formal governance and management structure, we ensure that your organization s board members and senior management value the importance of an information security program as an integral component to your organization s overall strategic plan. Incident Response Effective security breaches are usually targeted and damaging, resulting in a victim organization that finds itself in complete disorder. Security incidents are planned attacks on the communications or information processing systems of an organization and could be perpetrated by a variety of actors, from an angry employee to a hacker who has found valuable information to obtain. Therefore, an effective incident response program is a crucial aspect of an organization s Acumen Innovations Information Security Services 5

information security program. A serious data breach can place an entire organization in crisis mode. The IT department comes under extreme pressure during a major security incident. In implementing a comprehensive incident response plan, roles and responsibilities are defined, procedures are established, and communication is clear. We will provide you with access to a team of professionals with expertise in security, forensics, and regulatory compliance. Preparation is the most important component to consider in an incident response plan, but once a breach occurs, our emergency team will work to rapidly identify and contain security incidents, eliminate all threats, and minimize the impact and duration of the data breach. We can help your organization make optimal decisions when it matters most, leading to damage control and recovery from even the worst incidents. Incident Response Team- On Retainer Suffering a data breach is an alarming scenario for any organization. Our response team will act decisively to protect your organization with urgency and expertise. They will be available on call at any hour of the day until the incident has been conclusively resolved. The team will work to minimize disruption, data loss, and the duration of the incident. The response team will possess detailed knowledge of your systems architecture which allows for the most effective response possible. A member of the response team will also be onsite fighting the incident in a familiar environment within no more than 24 hours. When it comes to averting a potential data breach, we provide a thorough response until threats are definitively eliminated and normal operations can resume. Our Incident Response Retainer results in a lower cost for your organization in the event of requiring an incident response team to eliminate a security incident. Surplus hours will go towards improving your incident response program and capabilities. For more information about our services, please contact us at 888-995-7803 or info@acumeninnovations.com to schedule a free consultation. Acumen Innovations Information Security Services 6