Security Policy Assessment
A security policy assessment involves reviewing your organization’s existing security policies. Our engineers will help enhance current policies or develop new ones tailored to your needs. We can assist with policies such as the Acceptable Use Policy (AUP), Incident Response, Disaster Recovery, Remote Access, BYOD, and others.




Our Approach
All testing performed is based on the NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, OWASP Testing Guide (v4), and customized testing frameworks.
Planning
Rules of engagement are obtained and customer goals are collected.
Discovery
To find potential weaknesses, exploits, and vulnerabilities, we do enumeration and scanning.
Reporting
Document all discovered exploits and vulnerabilities, unsuccessful attempts, and the company's advantages and disadvantages.
Thorough Testing
Policies and plans we can assist with include, but are not limited to:
- Access Control Policy
- Acceptable Use Policy
- Incident Response Plan
- Disaster Recovery Plan
- Password Policy
- Bring Your Own Device (BYOD) Policy
- Remote Access Policy
- Acceptable Use Policy
- Other policies and plans depending on specific customer content

Discover How We Can Protect Your Assets
Reach out to learn how Ouroboros Security can address your cybersecurity challenges. Call us, send an email, or complete the contact form below to begin securing your organization today.