Security Policy Assessment

A security policy assessment involves reviewing your organization’s existing security policies. Our engineers will help enhance current policies or develop new ones tailored to your needs. We can assist with policies such as the Acceptable Use Policy (AUP), Incident Response, Disaster Recovery, Remote Access, BYOD, and others.

Our Approach

All testing performed is based on the NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, OWASP Testing Guide (v4), and customized testing frameworks.

Planning

Rules of engagement are obtained and customer goals are collected.

Discovery

To find potential weaknesses, exploits, and vulnerabilities, we do enumeration and scanning.

Reporting

Document all discovered exploits and vulnerabilities, unsuccessful attempts, and the company's advantages and disadvantages.

Thorough Testing

Policies and plans we can assist with include, but are not limited to:

  • Access Control Policy
  • Acceptable Use Policy
  • Incident Response Plan
  • Disaster Recovery Plan
  • Password Policy
  • Bring Your Own Device (BYOD) Policy
  • Remote Access Policy
  • Acceptable Use Policy
  • Other policies and plans depending on specific customer content

Discover How We Can Protect Your Assets

Reach out to learn how Ouroboros Security can address your cybersecurity challenges. Call us, send an email, or complete the contact form below to begin securing your organization today.

FOR SALES ONLY. FOR TECHNICAL SUPPORT, PLEASE CONTACT [email protected]

2 + 4 =