Comprehensive risk transparency is key for managing your information and IT security. Only with this insight will you be able to optimize security measures in a targeted, effective and efficient manner. Based on many years of profound experience and proven expertise, SCHUTZWERK can provide you with different types of security assessments in this area.
SCHUTZWERK provides the following security assessments for identification of your individual risks:
A targeted and regular scan for vulnerabilities within technologies, measures and concepts of information and IT security is an elementary component of the overall security strategy of modern companies. Based on the complexity of deployed information technologies and their inherent threats, there is a variety of sensible assessment approaches. Technical security thereby is an important key aspect; however, organizational and personnel security must also be included in the assessments. Thus, great demands are made on the assessors' know-how. It is therefore sensible to seek the support of a dedicated partner such as SCHUTZWERK GmbH, not least to guarantee an impartial review.
Scope and Approach
For each assessment, the exact scope and approach are agreed with the customer in advance. The following aspects, among others, can be taken into account (based on the classification of penetration tests proposed by the BSI):
Objective
Identification and risk assessment of vulnerabilities
Perspective of attacker
External attackers
Internal attackers
Privileged users
Aggressiveness
Each selectable between passive, cautious/calculated, and aggressive
Approach
Each selectable between stealthy to noisy
Information base & Techniques
Black-Box
Gray-Box
White-Box
Vulnerability scan
Manual analysis
Reverse Engineering
Social Engineering
Exploitation of vulnerabilities
Configuration analysis
Analysis of concepts and specifications
Interviews and workshops
Source code analysis
Analysis of concepts and specifications
Interviews and workshops
Scope
Comprehensive
Limited
Focused
Objective
Identification and risk assessment of vulnerabilities
Perspective of attacker
External attackers
Internal attackers
Privileged users
Aggressiveness
Each selectable between passive, cautious/calculated, and aggressive
Approach
Each selectable between stealthy to noisy
Information base & Techniques
Black-Box
Vulnerability scan
Manual analysis
Reverse Engineering
Social Engineering
Exploitation of vulnerabilities
Gray-Box
Configuration analysis
Analysis of concepts and specifications
Interviews and workshops
White-Box
Source code analysis
Analysis of concepts and specifications
Interviews and workshops
Scope
Comprehensive
Limited
Focused
Results
As a result of the assessment we will provide a detailed report. Depending on the type and scope of the project, the final report will include the following parts:
Management summary with a description of the results and the security level
Description of the project approach, scope, schedule and methodology
Detailed description of identified vulnerabilities in order to understand underlying issues and to enable reconstruction of possible attacks (where necessary with proof-of-concept implementation)
Detailed description of the iterative exploitation process when using chained vulnerabilities
Risk assessment of identified vulnerabilities taking into account the IT environment or the application context (risk classification: low, medium, high, critical)
Description of measures to remedy the vulnerabilities
If necessary, a description of higher-level strategy, concept and process-related measures or optimization suggestions.