Seal_of_the_United_States_Department_of_Homeland_Security.svg_

RISK/VULNERABILITY ASSESSMENT

UPON REQUEST AND AS RESOURCES ARE AVAILABLE, SCRIPT-WOLF CAN PROVIDE RISK AND VULNERABILITY ASSESSMENTS THAT IDENTIFY VULNERABILITIES THAT ADVERSARIES, AND OTHER THREAT RISKS COULD POTENTIALLY EXPLOIT TO COMPROMISE SECURITY/DATA CONTROLS.

AT THE CONCLUSION OF OUR ASSESSMENT, WE PROVIDE OUR CLIENT WITH THE CONFIDENTIAL ASSESSMENT DATA ALONG WITH TAILORED RISK ANALYSIS AND WAYS THEY CAN IMPROVE THEIR CYBERSECURITY POSTURE.

Seal_of_the_U.S._National_Security_Agency.svg_
cisa-gov

ASSESSMENT OVERVIEW

DURING AN RVA, (RISK/VULNERABILITY ASSESSMENT) WE COLLECT DATA THROUGH ONSITE ASSESSMENTS AND COMBINE IT WITH NATIONAL THREAT AND VULNERABILITY INFORMATION TO PROVIDE AN ORGANIZATION WITH ACTIONABLE REMEDIATION RECOMMENDATIONS PRIORITIZED BY RISK.

CISA DESIGNED RVAS TO IDENTIFY VULNERABILITIES THAT ADVERSARIES COULD EXPLOIT TO COMPROMISE NETWORK SECURITY CONTROLS.

AN RVA MAY INCORPORATE THE FOLLOWING METHODOLOGIES:

  •  SCENARIO-BASED NETWORK PENETRATION TESTING
  •  WEB APPLICATION TESTING
  •  SOCIAL ENGINEERING TESTING
  •  WIRELESS TESTING
  •  CONFIGURATION REVIEWS OF SERVERS AND DATABASES
  •  DETECTION AND RESPONSE CAPABILITY EVALUATION

AFTER COMPLETING THE RVA, WE PROVIDE THE ORGANIZATION A FINAL REPORT THAT INCLUDES BUSINESS EXECUTIVE RECOMMENDATIONS, SPECIFIC FINDINGS, POTENTIAL MITIGATIONS, AND TECHNICAL ATTACK PATH DETAILS.

ATT7K

ANALYSIS MAP

THE ANALYSIS MAPS THE ATTACK PATH TO THE MITRE ATT&CK®, WHICH IS A FRAMEWORK MEANT TO HELP BUILD A GLOBAL COMMUNITY-DRIVEN KNOWLEDGE BASE, COMPRISED OF THE KNOWN TACTICS, TECHNIQUES, AND PROCEDURES (TTPS) OF THREAT ACTORS. CISA PUBLISHED A BEST PRACTICES FOR MITRE ATT&CK MAPPING GUIDE THAT PROVIDES NETWORK DEFENDERS WITH CLEAR GUIDANCE, EXAMPLES, AND STEP-BY-STEP INSTRUCTIONS TO MAKE BETTER USE OF MITRE ATT&CK AS THEY ANALYZE AND REPORT ON CYBERSECURITY THREATS.

cyasset3

INFOGRAPHIC & ACTION PLAN

THE ANALYSIS ALSO COMES WITH AN INFOGRAPHIC THAT BREAKS OUT THE MOST SUCCESSFUL TECHNIQUES FOR EACH TACTIC DOCUMENTED FOR THE FISCAL YEAR AND INCLUDES THE SUCCESS RATE PERCENTAGE FOR EACH TACTIC AND TECHNIQUE.

GET AN ASSESSMENT

WE USE THE MITRE ADVERSARIAL TACTICS, TECHNIQUES, AND COMMON KNOWLEDGE (ATT&CK®) AND PRE-ATT&CK FRAMEWORKS.

SEE THE ATT&CK FOR ENTERPRISE AND PRE-ATT&CK FRAMEWORKS FOR REFERENCED THREAT ACTOR TECHNIQUES.

FOR MORE INFORMATION ABOUT SCRIPT-WOLF ASSESSMENT SERVICES, PLEASE CONTACT US AND WE CAN DISCUSS THE STEPS IN GETTING YOUR ORGANIZATION THE BEST CYBER DEFENSE ASSESSMENT!