It is a study aiming to reveal security situations and deficiencies by performing audits in 20 most risky basic areas to companies with methods accepted in terms of Information Technologies. This audit, which aims to provide a road map especially for companies that will make security investments, will offer management units a unique planning opportunity in the field of cyber security.
In the Security Assessment process, the existing Information Technologies infrastructure, Information Technologies processes, Security infrastructure and processes are examined and the areas where there is a gap are identified and the risks that they may pose are revealed.
- Allowed and Disallowed Device Inventory
- Allowed and Disallowed Application Inventory
- Secure Server Configuration
- Continuous Vulnerability Monitoring
- Virus Protection
- Software Security
- Wireless Access Control
- Data Recovery Capability
- Security Capabilities
- Security Network Configuration
- Network Control
- Admin Management
- Border Security
- Record Tracking
- Access Security
- Account Control
- Data Protection
- Incident Management
- Secure Network Engineering
- Penetration Tests and the Red Team