Ready to improve your security program?

Praetorian will benchmark your organization’s current cybersecurity posture to the NIST Cybersecurity Framework, and identify an appropriate target state based on the organization’s threat and vulnerability profile. By combining the NIST Framework and CCS's Top 20 Critical Security Controls a useful current/target state analysis can be performed and then utilized as a driver for prioritized activities to improve an organization’s security posture.

We use data gained during the various phases of a security audit to identify the current state. Working closely with your organization we will identify a target state based on the threats to your particular organization, your business needs, technology profile, and overall risk approach. Praetorian utilizes the results of technical security assessments, interviews, and documentation review to complete this service.


What is the Cybersecurity Framework?

The National Institute of Standards released Version 1.0 of the NIST Cybersecurity Framework Feb 12, 2014. The Framework provides a common taxonomy and mechanism for organizations to describe current and target state cybersecurity postures, identify and prioritize opportunities for improvement, and communicate cybersecurity risk.

The Framework Core consists of five concurrent and continuous Functions – Identify, Protect, Detect, Respond, Recover. Each of these Functions is further subdivided into several Categories that describe functions within an organization’s security program. The Categories are further divided into Subcategories which are tied to specific technical or management activities.



Praetorian always considers the broader set of enterprise services we have here at Qualcomm so reports and recommendations can be actionable by the people who receive them.

Qualcomm

Gabe Lawrence,
Senior IT Security Engineer
Qualcomm




The Framework also provides a way to classify the relative sophistication of an organization’s security posture through four identified Tiers (Partial, Risk Informed, Repeatable, and Adaptive). While not meant to be a full blown Maturity Model, the Tiers provide a mechanism to identify current and target states for the Categories within the Core.


CSC Top 20 Security Controls
Table: CSC Top 20 Security Controls (enlarge)

The NIST Framework is a useful tool to quantify an overall security posture, but currently lacks any prioritization of Functions or Categories. The Council on CyberSecurity has released a Top 20 list of high-value, prioritized security controls which cover the foundational components of an organization’s security program. Praetorian uses the CCS Top 20 as a target profile. As expected, the security controls are heavily weighted in the “Protect” Function of the Framework. By combining the NIST Framework and CSC Top 20 a useful current/target state analysis can be performed and then utilized as a driver for prioritized activities to improve an organization’s security posture.

The NIST Benchmark uses the data gained during the various phases of the security audit to identify the current state. Working closely with your organization we will identify a target state based on the threats to your particular organization, your business needs, technology profile, and overall risk approach.


Components of a Comprehensive IT Security Assessment Include:

External Vulnerability Assessments

Identifies and examines network vulnerabilities for external, Internet facing systems to determine whether they can be exploited by an attacker to compromise targeted systems or used to gain access to sensitive information. An optional external penetration testing phase includes exploitation of the underlying vulnerabilities.

External vulnerability assessment methodology →

Internal Vulnerability Assessments

Identifies and examines network vulnerabilities for internal, Intranet systems to determine whether they can be exploited by an attacker to compromise targeted systems or used to gain access to sensitive information. An optional internal penetration testing phase includes exploitation of the underlying vulnerabilities

Internal vulnerability assessment methodology →

Network Architecture Reviews

A network architecture review will evaluate the function, placement, and gaps of existing security controls and compare their alignment with the organization's security goals and objectives.

Network architecture review methodology →

Wireless Security Reviews

Praetorian's wireless penetration testing and assessment services evaluate the security of your organization's wireless implementations and provide recommendations for improvement. An optional wireless penetration testing phase includes exploitation of the underlying vulnerabilities.

Wireless security assessment methodology →

VPN Security Reviews

The VPN review compares your current configuration against recommended best practices and identifies any areas of concern. The assessment includes remote and onsite configuration review as well as an architecture review.

VPN security review methodology →

Firewall Security Reviews

Firewall security reviews are important because they identify vulnerabilities that cannot normally be detected through network penetration tests and black box network assessments.

Firewall security review methodology →

Host/OS Configuration Reviews

Host reviews comprehensively identify security issues within your environment. Praetorian engineers review the configuration of key applications, servers, databases, and network components to identify vulnerabilities that may go unnoticed during network testing.



Active Directory Reviews

Active Directory reviews are critical because of the role Active Directory plays in an environment and because the review allows us to identify vulnerabilities that cannot be detected through network testing.

Active directory review methodology →


Ready to get started?

Contact us at 1 (800) 675-5152 to get started with your NIST Cybersecurity Framework Benchmark needs, or request a callback by submitting the form below.