Security Health Check – Criteria

Our security health includes the following:

Security Health Check Itinerary
Initial scoping meeting to discuss requirement and purpose of the health check
Produce Plan detailing specific items to be reviewed and access requirements
Review of systems including meetings with appropriate personnel interviews and questionnaires
Data capture – this phase can be delivered onsite or remotely. Proprietary scripts are adopted to capture all required data
Detailed analysis of the data gathered
Produce Recommendations report
Produce Management report
Follow up meeting to discuss next steps

Our Security Health checks include the following:

Database Operating Systems
  Review existing security processes   File permissions and ownership
  Detection of database vulnerabilities   Password and username leakage
  Versions and patch management review   Audit and logging
  Review of users, passwords, roles   Group and suid privileges
  Review of configuration parameters   Examples and demos
  Assessment of authorization flaws   Open ports
  Review of account management   Configuration files and key file permissions
  Access controls  
  System privileges  
  Object privileges  
  Operating system access  
  Review of SQL and Java used  
  Review auditing configuration  
  Review of database links  
Networking General
  Configuration and password protection   Database and application set-up
  Logging   Parameters
  Network settings for security   Design and data usage
  Port access   Version, patches and revision status
    Backup and recovery regarding security
    Security of key data
    Systems usage (i.e. what other apps?)

Technologies Supported:

Oracle MongoDB
SQL Server Redis
MySQL Cassandra
OpenEdge Progress Neo4J
Tibero MariaDB
DB2 Informix
Operating Systems
AIX Windows 2000 – 2013
Microsoft Cluster Services HP-UX
RedHat Linux CentOS Linux
SUSE Ubuntu
Solaris Sun Clustering
Open VMS Tru-64
Security Health Check



Your Name*

Your Email*

Your Message*