Host Compliance & Malware Audit

A host compliance audit assesses a device (such as a workstation or server) to ensure it adheres to security best practices. Our engineers will examine the device’s security by testing measures like booting from alternate media, evaluating the effectiveness of endpoint security solutions against malware, reviewing firewall settings, checking patch management processes, and more.

Our Approach

All testing performed is based on the NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, OWASP Testing Guide (v4), and customized testing frameworks.

Planning

Rules of engagement are obtained and customer goals are collected.

Discovery

To find potential weaknesses, exploits, and vulnerabilities, we do enumeration and scanning.

Attack

Verify possible weaknesses by exploiting them, and carry out more research after gaining new access.

Reporting

Document all discovered exploits and vulnerabilities, unsuccessful attempts, and the company's advantages and disadvantages.

Thorough Testing

Activities performed during malware assessments include, but are not limited to:

  • Full disk encryption testing
  • Application whitelist testing
  • Process monitoring / control testing
  • Anti-virus (host) testing
  • USB restriction testing
  • Email filter testing
  • Web traffic proxy testing
  • Intrusion detection / prevention testing
  • Other testing depending on specific customer content and footprint

Discover How We Can Protect Your Assets

Reach out to learn how Ouroboros Security can address your cybersecurity challenges. Call us, send an email, or complete the contact form below to begin securing your organization today.

FOR SALES ONLY. FOR TECHNICAL SUPPORT, PLEASE CONTACT [email protected]

10 + 10 =