Obtain an accurate understanding of your security and risk posture, while ensuring compliance with industry regulators and information security best practices.
During an internal vulnerability assessment, Praetorian identifies vulnerabilities for internal, Intranet systems. Praetorian examines any identified vulnerabilities to determine whether they can be exploited by an attacker to compromise targeted systems or used to gain access to sensitive information. An optional penetration testing phase can be included to demonstrate exploitation of the underlying vulnerabilities.
Praetorian's penetration testing methodology assesses the targeted IP address ranges using a two-phased approach: 1) Host and service discovery, and 2) Vulnerability identification and verification.
Host and service discovery compiles a complete list of all accessible systems and their respective services with the goal of obtaining as much information about your internally facing assets as possible. This includes initial live host detection, service enumeration, and operating system and application fingerprinting. In particular, the discovery process will focus on identifying critical assets and major technologies in the environment such as Active Directory, ACS, and critical applications and databases.
With the information collected from the discovery phase in hand, security testing transitions to identifying vulnerabilities in internally facing systems and applications using automated scans and manual testing techniques. Praetorian begins the vulnerability identification process with commercial and open source vulnerability scanners. Automated scans are good at identifying known and common vulnerabilities; however, automated scans are not good at detecting complex security issues, uncovering system and application-specific vulnerabilities, developing attack chains, or validating the findings reported. For this reason, automated scans represent only a small facet of the overall security assessment with the majority of vulnerability testing focused on manual testing and verification. Finally, risk priorities are assigned to each vulnerability according to Praetorian's comprehensive risk rating scale.
Upon completion of the assessment Praetorian shall provide a single electronic report deliverable. The report will provide an analysis of the current state of the assessed security controls. The analysis will identify areas that need to be resolved in order to achieve an adequate level of security. The detailed contents of the deliverable are described below.
The report deliverable will include the following high level sections in a format suitable for management:
The report deliverable will also include the following in-depth analysis and recommendations for technical staff to understand the underlying risks and recommendations: