Security Assessments and Audits
Assessments and audits can not only identify open technical vulnerabilities, but also managerial and operational vulnerabilities. In addition to network and system scanning, which can identify a large number of technical and operational vulnerabilities, interviews and observation provide insight into how the system is actually operated – this exposes weaknesses that management may be completely unaware of. Once identified, these vulnerabilities will be thoroughly documented in our assessment or audit report so that they may be appropriately addressed and remediated in order to return the system to a secure posture in compliance with agency or company policy.
The stages of an assessment or audit are outlined below: