Cyber Security Assessment
Our Cyber Security assessment standards revolve around posture assessment, architecture analysis, control evaluation and risk matrix navigation. We follow standards and practices, however we are non-conventional in our approach. The red guys don’t follow convention and when we are on the red part of the story, we cannot be too conventional.
The assessment services are further broken up into a few categories which are collapsed on need basis
- Security architecture review
- Control evaluation
- Compliance evaluation
- Industry specific study
- Risk and governance evaluation
The work mates team brings in the native tool as well as third party tools expertise in this part of the activity . We are specialized in the AWS Security Hub and use the various tools present there to use the analysis more specific.
The Amazon Inspector is widely used by our team in this phase to understand the application vulnerabilities and try to record configuration issues with AWS Config.
Penetration testing and Vulnerability assessment
Our idea of VA and PT services is that our engineers are aware about the environment on which they are doing VA and PT and are trained enough to eliminate abvious outputs which are controlled by blue devices.
Our OSCP trained engineers and their teams are able to understand the deep-down vulnerabilities and also present to the customers parameters which can potentially cause no harm.
The methodology is clearly interpretation based, deep understanding of customer scenarios and having the idea of presenting the customer with needle inside the hay.
Crisp reports with crystal clear actionable are what we are trying to offer to our customers.
The AWS specialized teams Amazon Detective to achieve a lot of the goals .
Our team also uses various third party tools but for compliance we have a very good understanding of AWS Artifact and AWS Audit Manager.