Managing Organizational Risk
In today’s world, businesses are faced with a constantly changing threat landscape. To succeed, your organization must incorporate risk management into decision-making to lessen the opportunity for risk events or to decrease that event’s impact.
There are multiple risk areas your organization may wish to prioritize due to limited resources, for example. In support, NorthState offers a range of risk assessment options, all of them customizable to include specific areas of concern.
NorthState’s trained and experienced risk analysts research and study the complex and constantly evolving threat environment. A NorthState risk assessment identifies and documents risks, as well as providing clear, reasonable, and actionable remediation for risk owners and decision makers.
CIS Top 20 Assessments
The CIS Top 20 Critical Security Controls (formerly known as the SANS Top Twenty) is a comprehensive set of security best practices including hardware, software, access, malware, data, and other areas critical to managing an organization’s risk. NorthState is a licensed CIS member and experienced in the use of CIS tools and resources to assess organizational security programs. A NorthState CIS Top 20 assessment engages with your subject matter experts from multiple areas including support, operations, and management. The assessment provides a solid baseline assessment of security practices against internationally accepted best practices.
Organizational, Mission, and Information System Security Risk Assessment
In today’s world, organizations operate in highly complex, interconnected environments, using technology that is constantly updated and modified. This complexity, speed, and resource places demands on operations which helps you to define your organization’s governance, risk, and compliance goals. NorthState engineers and analysts assist decision makers with an assessment following the guidelines of NIST SP800-39 and related industry best practices, including ISO 270001:2017.
NIST Cybersecurity Framework Assessments
A NIST Cybersecurity Framework Assessment provides an in-depth review of your organization’s security standards, guidelines, and practices. It delivers:
- A real-world perspective on your current security posture
- An understanding of how best to strengthen and mature the security program
- Promote security awareness across the enterprise
NorthState has extensive experience assessing organizational security controls using the NIST Framework. Using input from your security subject matter experts from multiple areas including support, operations, and management, NorthState delivers a prioritized set of logical and actionable recommendations.
Security Operations Center (SOC) Assessments
A SOC’s value is the ability to respond to potential events in real time, lessening the time an attacker has for compromising the organization, while increasing the time available for response and recovery. NorthState assessments help organizations to evaluate their SOC’s capabilities and effectiveness. These are conducted by running a variety of realistic drills and exercises simulating attacks using its Penetration and Red Teams experience and skills, using different attack profiles to evaluate the SOC’s success for timely recognition and capture of attacks. The assessment provides a client scorecard and valuable experience and training for SOC operators.
Console assessments help your organization ensure that an appropriate level of control and monitoring is utilized across the infrastructure. NorthState performs the assessment using a combination of architectural diagrams, configuration files, operational documents, and input from key IT subject matter experts. Depending on your priorities, the assessment focuses on reviewing one or more areas for gaps in controls, scalability, reliability of operations, and over-all value-add for the enterprise. It includes, for example, assessment of firewalls, routers, switches, Linux servers, Windows servers, Active Directory, and load balancers.
Security Architecture Assessments
NorthState Security Architecture Assessments evaluate for appropriate controls and control implementation across your infrastructure. Based on your needs, the assessment may include both the architecture of the Internet perimeter and the internal network architecture. Following the guidance of NIST SP 800-115 and NIST SP 800-53, engineers provide assessment reports identifying gaps, areas of concern, and strength in the organizations security architecture. Each gap and area of concern is addressed with concise remediation recommendations.
Governance, Risk, and Compliance (GRC) Assessments
Every industry security best practice (NIST, ISO, PCI-DSS etc.) and regulatory requirement (HIPAA, GLBA, FDIC, etc.) calls for organizations to have processes to document and maintain effective organizational security controls and manage risk to critical information assets. Failure to maintain effective controls (policy, procedures, guidelines, etc.) is considered a lack of due diligence by the SEC and may place corporate officers at personal legal risk.
Depending on the maturity of the enterprise’s security controls, NorthState has the flexibility to assist with assessing existing policies, based on specific industry best practices or regulatory requirements. We are equally prepared to provide program assessments, security program road maps, and support for developing and implementing an enterprise security management system leading to certification.
Endpoint Malware Assessments
Malware Assessments provide clients with an evaluation of their endpoint and network-based threat detections system’s ability to detect or prevent malware. The assessment may also include evaluation of its ability to detect or prevent malware with advanced persistent threat (APT) features. Using custom tools and safe malware, NorthState engineers simulate malware event opportunities to test the client’s malware systems prevention and response. A final report provides recommendations for technical and process corrective actions.
Confidentiality-Integrity-Availability (CIA) Assessments
The focus of a NorthState Confidentiality-Integrity-Availability (CIA) assessment is identifying systemic architectural, administrative, and security issues within the core systems (servers on which the day-to-day operations depend), including customer and personally identifiable information (PII). The assessment provides management critical feedback to assist with maturing and strengthening your organization’s security program. NorthState uses a variety of elements including subject matter expert interviews, integrity checks, process monitoring, patch management, user and privileged access management, software controls, and change management. Additional elements may include network complexity, organizational goals, and management expectations.