Vulnerability assessment for Remote Office environments

Vulnerability assessment for Remote Office environments

During a pandemic, extraordinary measures, like implementing home office happened from day-to-day in most organizations. To enable this, Operations teams had to create the telecommuting environment and remote accesses in days. A time window this small inevitably leads to some non-compliances and security gaps, which can endanger or not sufficiently protect the organization’s systems and data.

In most of the cases, SOHO networks can’t comply with the rigorous enterprise security rules, therefore data stored and transmitted on these (both private and organizations-owned) can be at risk (hacking, ransomware, data leaks for example). This also applies to remote systems and data, which are, albeit they are within the perimeter, also at risk due to home office.

From the perspective of the attacker, while the employee is at home office, its home and workplace are the same; therefore, in case of telecommuting, the organizations needs to protect the home network of the employee too.

No matter which side is targeted (home or office), if the attack is successful, then the attacker can reach the organization’s systems and data, and that can cause corruption in the CIA triad, data leaks of compromise of business continuity and at the end, financial or reputational loss.

To avoid these, it’s recommended to assess the vulnerabilities within the organization’s work-from-home platform, in regards to its implementation and operation.

With this service from Black Cell, you can get a holistic view about the security and vulnerabilities of the systems enabling telecommuting.

Vulnerability assessment for the IMPLEMENTATION of Remote Office environments

The goal of this assessment is to point out the vulnerable services and the possibly already leaked data, which can be used for a successful cyber-attack.

The steps of this assessment:

  • We map the remote access points/published services of the organization, by using OSINT techniques
  • If this data is not available publicly, then we test the URLs and IP addresses given by our client
  • Black Box testing of the Web-based. publicly available interfaces
  • Assessment of the Web-based Email system (e.g. OWA)
  • User education, remediation and report package about the vulnerabilities, remediation and attack surface reduction

Vulnerability assessment for the OPERATION of Remote Office environments

The goal of this assessment is to evaluate the remote access points on the internet among their access levels and the vulnerabilities of the network infrastructure and to give remediation plans to these vulnerabilities. This service package first assessing the implementation of telecommuting and then, based on the earlier assessment, deeply evaluate the security and vulnerabilities within the infrastructure.

The steps of this assessment:

  • Assessment of the remote office environment (see above)
  • Testing the following with a user account, provided by the client:
  • Network security
  • Configuration of remote accesses
  • Proper set-up of privileges
  • Mapping the vulnerabilities of the applications, services, servers and devices on the internal network, which are available for remote work
  • If required, mapping the detection and reaction capabilities of the organization’s SIEM/IDS/IPS systems, working together with IT Security
  • User education, remediation and report package about the vulnerabilities, remediation and attack surface reduction
tavmunka-serulekenysegvizsgalat-ethicalhacking
Top