Security Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

Similar documents
HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

Network Detective. Prepared For: Your Customer / Prospect Prepared By: Your Company Name

AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT FIVE. Microsoft Windows Security.

Comprehensive Mitigation

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Checklist: Credit Union Information Security and Privacy Policies

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

MANAGING LOCAL AUTHENTICATION IN WINDOWS

EFFECTIVE VULNERABILITY MANAGEMENT USING QUALYSGUARD 1

Information System Security. Nguyen Ho Minh Duc, M.Sc

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Vulnerability Management Policy

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

SERVER HARDENING CHECKLIST

Software Updating: Hitting the Mark

Cybersecurity The Evolving Landscape

What is HIPPA/PCI? Understanding HIPAA. Understanding PCI DSS

Subject: University Information Technology Resource Security Policy: OUTDATED

Proxy server is a server (a computer system or an application program) that acts as an intermediary between for requests from clients seeking

SECURITY & PRIVACY DOCUMENTATION

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

HIPAA Compliance Assessment Module

Bank Infrastructure - Video - 1

Performing a z/os Vulnerability Assessment. Part 2 - Data Analysis. Presented by Vanguard Integrity Professionals

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017

What to Look for When Evaluating Next-Generation Firewalls

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

PCI Compliance Assessment Module with Inspector

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

How NOT To Get Hacked

K12 Cybersecurity Roadmap

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Security Audit What Why

Case Study: The Evolution of EMC s Product Security Office. Dan Reddy, CISSP, CSSLP EMC Product Security Office

How to Configure ATP in the Firewall

Standard Development Timeline

Exam : JK Title : CompTIA E2C Security+ (2008 Edition) Exam. Version : Demo

Information Technology General Control Review

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

UTAH VALLEY UNIVERSITY Policies and Procedures

Contents. Background. Use Cases. Product Introduction. Product Value

ANATOMY OF AN ATTACK!

Executive Summary. Flex Bounty Program Overview. Bugcrowd Inc Page 2 of 7

Product Guide Revision B. McAfee Cloud Workload Security 5.0.0

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Schedule document N4MDM. PUBLIC Node4 limited 31/11/2018. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

SCHEDULE DOCUMENT N4MDM PUBLIC NODE4 LIMITED 13/07/2017. Node4 Limited Millennium Way Pride Park Derby DE24 8HZ

Copyright

Lakeshore Technical College Official Policy

A company built on security

Payment Card Industry (PCI) Executive Report 11/07/2017

POLICY FOR DATA AND INFORMATION SECURITY AT BMC IN LUND. October Table of Contents

Cyber Protections: First Step, Risk Assessment

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

Cyber Risks in the Boardroom Conference

SECURING YOUR HOME NETWORK

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

How to Configure ATP in the HTTP Proxy

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

On Limitations of Designing LRPS: Attacks, Principles and Usability

Why the cloud matters?

ACM Retreat - Today s Topics:

DoD Guidance for Reviewing System Security Plans and the NIST SP Security Requirements Not Yet Implemented This guidance was developed to

McAfee Cloud Workload Security Product Guide

CompTIA SY CompTIA Security+

The Learner can: 1.1 Describe the common types of security breach that can affect the organisation, such as:

GFI product comparison: GFI LanGuard 12 vs Microsoft Windows Intune (February 2015 Release)

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

PCI DSS and VNC Connect

exam. Number: Passing Score: 800 Time Limit: 120 min File Version: CHECKPOINT

Designing and Building a Cybersecurity Program

Insurance Industry - PCI DSS

MOBILE THREAT LANDSCAPE. February 2018

The Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels

Take Risks in Life, Not with Your Security

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

n Explain penetration testing concepts n Explain vulnerability scanning concepts n Reconnaissance is the first step of performing a pen test

Brian S. Dennis Director Cyber Security Center for Small Business Kansas Small Business Development Center

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

Bomgar Discovery Report

Securing Network Devices with the IEC Standard What You Should Know. Vance Chen Product Manager

Web Application & Web Server Vulnerabilities Assessment Pankaj Sharma

Cyber Security Hardening Guide

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Tiger Scheme QST/CTM Standard

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Internal Audit Report DATA CENTER LOGICAL SECURITY

4 Information Security

Transcription:

Security Assessment Prepared For: Prospect Or Customer Prepared By: Your Company Name

Agenda Security - External & Outbound - Policy Compliance Risk and Issue Score Issue Review Next Steps

Security - External & Outbound External Scan Results Content Filtering Assessment Account Lockout Policy Risk and Issue Score 42.62.65.25 Medium risk 176.28.51.58 (rs208305.rs.hosteurope.de) High risk 46.38.236.232 (fbnhffmnn.de) Medium risk 63.230.176.46 (etsio-prod.cnf.com) Medium risk 193.23.123.40 (rev-040.snrm.fr) High risk Total: 5 High risk

Security - Policy Compliance Password Policy Account Lockout Policy Policy Setting Policy Setting Maximum password age 0 days Account lockout threshold 0 invalid logon attempts Minimum password age 30 days Minimum password length 7 characters Password must meet complexity requirements Enabled Store passwords using reversible encryption Disabled

Risk and Issue Score Current Risk Score Current Issue Score

Automatic screen lock not turned on. (72 pts) Issue: Automatic screen lock prevents unauthorized access when users leave their computers. Having no screen lock enable allows authorized access to network resources. Recommendation: Enable automatic screen lock on the specified computers.

Password history not remembered for at least 6 passwords (72 pts) Issue: Short password histories allow users to rotate through a known set of passwords, thus reducing the effectiveness of a good password management policy. Recommendation: Increase password history to remember at least 6 passwords.

Account lockout disabled (77 pts) Issue: Account lockout (disabling an account after a number of failed attempts) significantly reduces the risk of an attacker acquiring a password through a brute force attack. Recommendation: Enable account lockout for all users.

Inconsistent password policy / Exceptions to password policy (68 pts) Issue: Password policies are not consistently applied from one computer to the next. A consistent password policy ensure adherence to password best practices. Recommendation: Eliminate inconsistencies and exceptions to the password policy.

Critical External Vulnerabilities Detected (95 pts) Issue: External vulnerabilities may potentially allow malicious attacks from outside your network and should be addressed as soon as possible. External vulnerabilities are considered potential security holes that can allow hackers access to your network and information. Recommendation: We recommend assessing the risk of each vulnerability and remediating all external vulnerabilities as prescribed.

Medium Severity External Vulnerabilities Detected (75 pts) Issue: External vulnerabilities may potentially allow malicious attacks from outside your network and should be addressed as soon as possible. External vulnerabilities are considered potential security holes that can allow hackers access to your network and information. Recommendation: We recommend assessing the risk of each vulnerability and remediating all external vulnerabilities as prescribed.

System Protocol Leakage (45 pts) Issue: System protocols were allowed to be sent outbound. To prevent potential loss of data and reduce the risk of malicious behavior by malware, these protocols should be restricted or blocked by external access controls. There are very few instances where system protocols are needed outside of the internal network. Allowing these protocols to \"leak\" does not mean that they are currently posing a threat, but is an indication of a lack of a managed firewall or proper policies to block these protocols. Recommendation: We suggest ensuring adequate access controls in place to block these protocols or note them as acceptable risks.

Lack of Web Filtering (62 pts) Issue: Access appears to all websites appears to be unrestricted. This issue does not imply that any particular user is currently accessing restricted sites, but rather that they can. Controlling access to the Internet and websites may help reduce risks related to security, legal, and productivity concerns. Lack of adequate content management filtering to block restricted sites may lead to increased network risk and business liability. Recommendation: We propose putting in place access controls to block websites that violate the company's Internet use policy.

Next Steps Agree on List of Issues to Resolve Present Project Estimates and Costs Establish Timelines Set Milestones Get Signoff to Begin Work