Objective |
To identify security issues pertaining to the database that arise due to procedural lapses, misconfiguration, missing vendor patches etc |
What we will do |
- Information Gathering
- Review of Data Access that includes:
- Perimeter controls
- User identity and access management
- Application systems (particularly ERP systems)
- Privileged users (excessive access rights than needed)
- Protection From Software Vulnerabilities (Missing Patches)
- Hardening System Components (Changing default passwords, Deleting default unused accounts etc.)
- Reviewing Data Backup and recovery procedures
- Reviewing Business continuity measures
- Compliance Requirements for Stored Data
- Mitigation Strategies for the identified risks
- Report Generation
|
Requirements |
- Sign a Non-Disclosure Agreement (NDA)
- Provide the Network/segmentation diagram representing the location of the DB servers
- Details of external connectivity allowed to DB server (if any)
- Network / segmentation diagram where DB servers are located
|
What you get |
Security Assessment Reports:
- Executive (for executive managers) and Technical (for IT administrators) reports that include findings and recommendations
- Follow-up activities to assist in implementing the recommendations and mitigating the risks
|
Suggested frequency |
|