Services Details

Host Compliance & Malware audit




A host compliance audit evaluates a device (workstation, server, etc.) for security best practices. Our engineers compute the security of the device via measures such as attempting to boot alternate media, evaluating endpoint security against malware, reviewing firewall configurations, reviewing patch management, and furthermore.

OUR METHODOLOGY

All testing performed is based on the NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, OWASP Testing Guide (v4), OWASP Top 100 Scenerios, and customized testing frameworks.

  • Discover:Client aims are gathered and rules of engagement are obtained.
  • Analysis:Accomplish scanning and enumeration to identify critical vulnerabilities, weak areas and exploits.
  • Attack:Confirm critical vulnerabilities through exploitation and perform additional impacts over new access.
  • Reporting:Confirm critical vulnerabilities through exploitation and perform additional impacts over new access.