Overview

This service consists of Network Architecture Review, Network Traffic Analysis, Server Inspection, Configuration Review and PC Inspection. We provide enhancement recommendations through the integrated security assessments.

Check Items

Check Item

Description

Network Architecture Review

  1. Review network architecture for security weakness.
  2. Review for network security design, network access control and server allocation.

Network Traffic Analysis

Packet capture and analysis

  1. Analyze if any abnormal external connection or DNS query from internal PC or device.
  2. Packet capture for 6 hours or more.

Network device log analysis

  1. Analyze logs of network and security devices.
  2. Analyze if any log of abnormal external connection.
  3. Analyze logs of 100MB.

User PC Inspection

User PC malware inspection

  1. Inspect user PCs for malware.

User PC update check

  1. Check updates for OS, Office, antivirus, Adobe Acrobat and Adobe Flash Player.

User PC configuration review

  1. Review security configuration for user PCs, based on the Government Configuration Baseline.

Server Inspection

Server malware inspection

  1. Inspect servers for malware.

Server update check

  1. Check updates for OS, Office, antivirus, Adobe Acrobat, Adobe Flash Player and database (Microsoft SQL Server).

Configuration Review

Review policies of directory servers

  1. Review group password policy and account lockout policy of directory servers (e.g. Microsoft Active Directory)

Firewall policy review

  1. Review for security weakness in firewall policies.
  2. Verify policy appropriateness of source IP, destination IP and protocol.

Features

Our self-developed 5-in-1 Cyber Security Evaluation platform consist of malware detection, OS update check, configuration check, database update check and 3rd party software update check.

Target Clients

Cyber Security Evaluation is mainly for government agencies, educational institutions, state-owned business, medical institutions and enterprises.

Goal

Cyber Security Evaluation is to assess the overall security strength from the aspect of network, system and endpoint. Through identifying the weakness in architecture and providing recommendations, we deliver references for security enhancement.

The benefits are as follows.

  1. Combining with automated tools and expert inspection, we can spot malwares and suspicious files in your servers, then we analyze and eliminate them.
  2. Through network traffic analysis and inspection, we can find out malicious connections from/to infected servers. Then we monitor and protect them and provide enhancement recommendations.
  3. Through interviewing server/equipment administrators and scanning with professional tools, we can identify the risks in server configuration, firewall planning and network architecture then harden the protection.

Award

In the “Review of the Security Service Provider” by Security Department of the Executive Yuan, CHT Security is the only security company that has achieved the top-notch grade in SOC, cyber security evaluation, penetration test and social engineering assessment for consecutive years.


More testing services:

Contact Us