Security Posture Assessment(SPA)



Similar documents
Ofisgate Verified Program

High Speed Broadband. Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur, Malaysia

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Payment Card Industry Data Security Standard

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Network Support. Technical Certificate. Program Outcomes: FOUNDATION COURSES. 1 of 7

Request for Proposal INFORMATION SECURITY ASSESSMENT SERVICES RFP # Addendum 1.0

HP Security Assessment Services

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Information Security: A Perspective for Higher Education

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

Four Top Emagined Security Services

Information Security Services

OCCS Procedure. Vulnerability Scanning and Management Procedure Reference Number: Last updated: September 6, 2011

Open Source Toolkit. Penetration Tester's. Jeremy Faircloth. Third Edition. Fryer, Neil. Technical Editor SYNGRESS. Syngrcss is an imprint of Elsevier

Information Security Policy

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

85% of business networks identified with bot infections 63% of business networks identified to have downloaded malware files 89% of business networks

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Response to Questions CML Managed Information Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Connecting the Global Enterprise

Stop Identity Theft. with Transparent Two-Factor Authentication. e-lock Corporation Sdn Bhd

Deploying Firewalls Throughout Your Organization

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

Chapter 1 The Principles of Auditing 1

A HELPING HAND TO PROTECT YOUR REPUTATION

ICT budget and staffing trends in the UK

Understanding Vulnerability Management Life Cycle Functions

U06 IT Infrastructure Policy

Information Technology Cluster

Cisco Security Optimization Service

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Alcatel-Lucent Services

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Information Technology Security Review April 16, 2012

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

H.I.P.A.A. Compliance Made Easy Products and Services

MANAGED SECURITY SERVICES

IT Security. Securing Your Business Investments

SANS Top 20 Critical Controls for Effective Cyber Defense

Penetration Testing. I.T. Security Specialists. Penetration Testing 1

ICT budget and staffing trends in Healthcare

Security Practices for Online Collaboration and Social Media

Configuring a customer owned router to function as a switch with Ultra TV

ICANWK406A Install, configure and test network security

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

PCI DSS. Get Compliant, Stay Compliant Seminar

PCI Compliance. Top 10 Questions & Answers

How To Implement Data Loss Prevention

Payment Card Industry (PCI) Data Security Standard

Penetration testing & Ethical Hacking. Security Week 2014

Avoiding the Top 5 Vulnerability Management Mistakes

The Protection Mission a constant endeavor

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

COMPANY PROFILE IONKLIK NETWORK

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

HEC Security & Compliance

Diploma in Information Technology Network Intergration Specialist COURSE INFORMATION PACK

Network and Security Controls

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Technical Testing. Network Testing DATA SHEET

INFORMATION SECURITY TRAINING CATALOG (2015)

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

PCI Security Scan Procedures. Version 1.0 December 2004

Achieving PCI Compliance Using F5 Products

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Threat Management: Incident Handling. Incident Response Plan

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

How To Secure Your Store Data With Fortinet

CONTENTS. PCI DSS Compliance Guide

THE TOP 4 CONTROLS.

C015 Certification Report

Diploma in Information Technology Network Integration Specialist COURSE INFO PACK

Developing Network Security Strategies

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

PCI-DSS Penetration Testing

PCI Compliance Top 10 Questions and Answers

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

AL RAFEE ENTERPRISES Solutions & Expertise.

Transcription:

Security Posture Assessment(SPA) Headquarters: Ofisgate Sdn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia Regional Office: Ofisgate (s) Pte Ltd, 205B Thompson Road, Goldhill Centre, Singapore

Understand Your Current Security State Understanding your organization s security state and identifying vulnerabilities is the first step toward protecting the confidentiality, integrity and availability of critical data. It is also an important component for achieving regulatory compliance. Protection of Information Access Protection of Information Reliability Protection of Information Availability Protection of Information Integrity SPA to secure ICT Assets

Understand Your Current Security State Your organization may be vulnerable to attack from the outside or the inside if you remain unaware of security issues, simply ignore them or don t sufficiently manage them. An attack may take down your network or lead to the theft of sensitive data customer information, employee information or intellectual property. The ensuing loss of public trust or the failure to comply with regulations could result in severe financial repercussions. A major security breach could also cause irrevocable damage to your organization s reputation. IMPACT SOLUTION To effectively protect your organization, you first need to evaluate where you stand in relation to industry best practices and regulatory requirements. A gap assessment will help identify the most effective course of action based on your business objectives.

Understand Your Current Security State A ROADMAP TO A MORE SECURE NETWORK Going much deeper than an ordinary assessment, the Internet Security Systems Information Security Assessment provides a comprehensive evaluation of your information security posture. Based on the globally recognized ISO 17799 standard and industry best practices, the assessment by Ofisgate Sdn Bhd security experts will thoroughly document the results and provide you with specific recommendations for mitigating the identified risks and improving overall security posture

Benefits Of the Information Security Assessment Provides a clear understanding of current information security risks Identifies the potential impact of vulnerabilities on your network infrastructure Raises internal awareness of information security risks Enables more informed decision-making and identifies the gaps in organizational security controls, policies and processes Provides a specific, actionable plan to improve overall security posture based on business needs Enables you to proactively address security issues before they are exploited Helps to meet regulatory compliance requirements

SPA Scope of Work This document is intended to show and analyze network security issues to the management and technical staff. The audit report outlines: Network Assessment Host / Server Security Assessment Application and Database Assessment Physical Assessment ICT Security Policy Assessment Penetration Test (Internal & External) Reporting / Recommendation / Presentation Transfer of Technology (ToT) & Hands-On Security Training

Project Timeline Pre Assessment Assessment Post Assessment Project Handover

Pre Assessment Assessment Post Assessment SPA Project Phase Project Planning and initiation Customization of assessment procedures Network Assessment Host/ Server Security Assessment Application and Database Assessment Physical Assessment ICT Security Policy Assessment Penetration Test (Internal & External) Reporting / Recommendation/ Presentation Transfer of Technology (ToT) & Security Hands- On Training

Network Design Audit and Network Parameters Evaluation BTM WAN Network Internal Datacenter Network BTM NOC

Internal and External Network Devices Assessment 1 Firewall 1 AV Admin Server, 2 AV District Hosts and 4 user PCs 1 Content Filtering / IPS Example 1 Core Switch and 2 Access Switches 7 Types 1 Email Security Gateway 3 Routers 3 Wireless Appliances

Host / Server and Desktop Security Assessment Server Farm DMZ 2x Branches User HQ User Example

Application and Database Security Assessment One (1) Portal Five (5) Web Applications Two (2) My SQL Database Two (2) Oracle Database Example

Operating System & Configuration Management 10 Windows Hosts 5 Linux Hosts 3 HQ Users 3 District Users 21 Hosts Example

Physical and Environment Security Audit One (1) Customer a Datacenter One (1) NOC Example

ICT Security Policy Assessment / Review One (1) Customer A ICT Security Policy Example

Internal Penetration Test Server Farm DMZ HQ User 2x District User Example

External Penetration Test One (1) Agency Portal Seven(7) Web Applications One(1) Email 9 Hosts Example

Report Presentation Six (6) Reports Report Presentation Including (1) Executive Summary Report Example

Security Awareness One (1) Security Awareness Session

Training Three (3) Network Security Hands-On Training

Tools Nikto2 MATASANO Flint Firewall Checker

For enquiries about our products, services or to schedule a sales presentation: e: sales_enquiries@ofisgate.com For contact information: OFISGATE SDN BHD (610820-A) 2-15, Jalan Jalil Perkasa 13, Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, MALAYSIA. Tel: +603 8994 0778 Fax: +603 8994 0779