How are security assessments performed?
Following initial technical and scoping exercises:
- Security configuration and controls defined in the External Security Manager (ESM) are examined for each database
- Policies and procedures for formal and informal controls are evaluated for weaknesses
- Poor or weak controls and protections for sensitive data, libraries, and user privileges are captured
- A detailed report with summary, results, descriptions of vulnerabilities and a remediation project plan are delivered upon completion and reviewed with your team