Our gap analysis is an interview-driven process which comprehensively explores your current security policies, procedures, and techniques. We’ll find the gaps in your NIST/DFARS compliance, and provide a roadmap for meeting your compliance objectives.
Some of the topics our interviews will cover include:
This assessment involves a comprehensive audit on all the ways electronic protected health information (ePHI) is stored, processed, or transmitted on your network. A HIPAA/HITECH Gap Analysis will be a complete audit of your organization’s:
Our gap analysis is an interview-driven process which comprehensively explores your current security policies, processes, and infrastructure against General Data Protection Regulation (GDPR) Requirements. After evaluating the scope of your environment, and the privacy data that is stored, processed, or transmitted throughout your environment, Triaxiom will evaluate your organization’s compliance posture, identify any shortfalls, and provide tailored recommendations to boost your security posture and meet compliance requirements. Topics include:
Level 1 Merchants and Service Providers
Triaxiom is a PCI Certified Qualified Security Assessor (QSA) organization. As such, we are certified by the PCI Council to perform your QSA On Site Assessment for Level 1 Merchants or Service Providers. Our consultants have conducted countless PCI Compliance Assessments, filling out numerous Reports on Compliance and Self Assessment Questionnaires for organizations across a wide variety of industries.
Level 2, 3, 4 Merchant and Service Providers
Lower level merchants and service providers can leverage a Qualified Security Assessor (QSA) to assist them with determining their scope, what PCI requirements pertain to their organization, and assist with filling out their applicable Self Assessment Questionnaire (SAQ). Further, the SAQ will reflect that you had a QSA assist you, demonstrating to your clients and merchant bank that you had an unbiased third-party assess your compliance.
A formal risk assessment evaluates the threats to your organization, the vulnerabilities of your network, and the security controls you have in place to protect your network. A risk assessment correlates information from your security assessments and evaluates the overall risk to your organization to help drive strategic decisions.
Our best practice gap analysis is an interview based review of your information security program. We use the Center for Internet Security (CIS) Top 20 Critical Security Controls to comprehensively review all aspects of your information security program. Some of the areas covered include:
Have a need not mentioned? Contact us today to customize an assessment or package to meet your security needs. Our engineers have a wealth of experience performing a wide variety of assessments, and we’re confident they can meet your needs. Let us know how we can help.
When you suspect you have been breached, knowing exactly how it happened and what was affected can be difficult to discern. Our certified engineers can assist you with the incident response process, ensuring the malware is removed and normal business operations are restored. Moreover, our root-cause analysis will attempt to determine how the breach was possible and steps to take to prevent it from happening again. Moreover, we will evaluate the malware including:
Comprehensive security policies written by security professionals. Our policies are designed to meet your compliance needs while optimizing your business requirements. Some of the policies we can help with include:
Developing a secure IoT solution depends on a number of security considerations. This assessment will evaluate the IoT device and its associated infrastructure against common attacks. It can include an evaluation of the edge device, the gateway, the cloud infrastructure, and/or any mobile applications. Our engineers will evaluate your IoT Device utilizing the OWASP IoT Framework Assessment methodology.
This assessment is an evaluation of your organization’s cloud infrastructure for security vulnerabilities. Our engineers will assist you in evaluating the unique security responsibilities associated with cloud computing. Individual services can include cloud application assessments, cloud infrastructure penetration testing, host/OS configuration audits, and cloud architecture reviews.
During a password audit, our engineers will evaluate the strength of passwords currently in use in your organization. We will take a dump of your employees’ hashed credentials and run them through a password cracker to identify weak passwords and common usage patterns. This audit can be used to justify stronger password policies, used in security awareness training to improve password choice among employees, and used to help understand the organization’s overall risk if an attacker is able to capture hashed credentials.
A firewall audit is a manual inspection of your firewall using the Center for Internet Security (CIS) benchmark and device-specific best practices. In addition, our engineer will review the firewall rules, searching for overly specific rules, proper rule sequencing, or other gaps in your security posture. Finally, the firewall audit will include network scanning to validate its effectiveness.
A host compliance audit involves the manual inspection of a workstation, server, or network device using the Center for Internet Security (CIS) benchmark and device-specific security best practices. This assessment will identify the security holes in your system and provide specific actions to take to harden the device.
Vulnerability scanning is a regular, automated process that identifies the potential points of compromise on a network. A vulnerability scan detects and classifies system weaknesses in computers, networks and communications equipment and predicts the effectiveness of countermeasures. Our engineers will conduct this scan for you and use our expertise to remove false positives and produce a risk-prioritized report.
A physical penetration test is an assessment of the physical security of your premises. Our engineers will attempt to gain access to your facility by identifying weaknesses and/or using social engineering. Once inside, our engineers will attempt to gather sensitive information, gain access to sensitive areas such as the data center, and attempt to gain internal network access.
This assessment is designed to target and take advantage of the human-element to gain access to your network. This is done using a variety of methods to get an employee to click on something they shouldn’t, enter their credentials or otherwise provide them when they shouldn’t, or divulge information that may assist an attacker in breaching your network. The goal for the engineer performing this assessment is to gain information that may assist an attacker in future attacks, gather credentials, or gain a foothold on the internal network. This assessment will include:
An external penetration test emulates an attacker trying to break into your network from the outside. The goal of the engineer performing this assessment is to breach the perimeter and prove they have internal network access. This test includes:
An internal penetration test emulates an attacker on the inside of your network. This could be either an attacker who is successful in breaching the perimeter through another method or a malicious insider. The goal of the engineer in this module is to gain root and/or domain administrator level access on the network, and gain access to sensitive files. Activities include:
A wireless penetration test is a comprehensive evaluation of the wireless networks in your organization using automated and manual methods. Areas covered include:
A web application penetration test is an in-depth penetration test on both the unauthenticated and authenticated portions of your website. The engineer will test for all of the OWASP Top-10 critical security flaws, as well as a variety of other potential vulnerabilities based on security best practice. Activities include:
Automated page speed optimizations for fast site performance