Фильтр
Направление
Тип услуги

Security Analysis and Penetration Testing

RED TEAM OPERATIONS SERVICE

Red Team Operations service

Range of works on checking the cyber security processes quality in a company and the ability to track or prevent a possible attack. During the work, there is close interaction with the defense team to track down possible gaps in correlation rules, deficiencies in security information configurations or incident response processes.

SECURITY ANALYSIS

Detecting weak passwords

We offer a set of actions aimed at checking the strength of passwords used on a corporate network against hacking or guessing. As a result, the customer receives a list of those accounts that can be compromised in a short time using online brute force techniques and data on public leaks of authentication data.

SECURITY ANALYSIS

Wireless network security analysis

Wireless networks, due to the range of access points outside the controlled perimeter, can become another entry point into the internal network. As part of this service, a set of actions is performed aimed at checking the possibility of intercepting and hacking wireless network authentication data, organizing spoof access points and carrying out attacks on network clients. The ability to penetrate the network through wireless networks is assessed both with a presence in the controlled area and outside it.

SECURITY ANALYSIS

Security analysis of mobile and web applications

Range of works on assessing the security status of applications as a separate information system. The work is carried out taking into account generally accepted practices and recommendations of OWASP and SANS/CWE. Not only technical aspects are checked, but also the business logic of applications and the possibility of carrying out attacks on application clients.

PENETRATION TESTING

Physical penetration testing

Range works on simulating the attacker actions, the purpose of which is unauthorized penetration into the physical perimeter and gaining access to confidential information. Imitation of an attacker’s actions and demonstration of attack vectors that can be implemented using identified deficiencies in the protection of the organization’s physical perimeter.

PENETRATION TESTING

Social engineering

User awareness of social engineering attacks can play a key role in the information security processes of the entire company. As part of the service, a set of actions is carried out is to check employees’ awareness of attacks using social engineering techniques. Various scenarios and legends are developed that exploit human weaknesses (for example, curiosity, fear, thirst for profit).

PENETRATION TESTING

Internal penetration testing

Simulation of an attacker's actions aimed at unauthorized penetration into information system and gaining access to confidential information. Simulation is performed to demonstrate attack vectors that can be realized using the identified vulnerabilities. The work is performed from the local network (with the presence of an expert at the site) or remotely (via VPN), requiring only access to a network outlet (Black Box) or a minimal account (Gray Box), the goal is to gain control information systems or confidential data.

PENETRATION TESTING

External penetration testing

Range of works on simulating the attacker actions, the purpose of which is unauthorized penetration into information system and gaining access to confidential information. The goal is to demonstrate attack vectors that can be implemented using identified vulnerabilities. The work is carried out from the Internet, does not require additional privileges (Black Box), the goal is unauthorized access to the internal information systems network.

Certification of Informatization Objects

Certification of Informatization Objects

Certification of informatization objects

Verification of compliance with information protection requirements established for SIS, PDIS, CII, APCS.  Development of certification tests program and methods, on the basis of which certification tests are conducted. As a result, certification tests protocol and conclusion on the possibility or impossibility of issuing a certificate of conformity are drawn up. If the conclusion is positive, a certificate of compliance with information protection requirements is issued for the informatization object.

Safe Development

CONSULTING DEVSECOPS

Service for auditing the level of information security maturity during the development process (OWASP SAMM methodology) and development of RoadMap to improve security

Cyber security maturity level audit in the development and Roadmap establishment to improve security. Development safety assessment for compliance with the world's leading DevSecOps practices. The current state of application development cycles is analyzed and a roadmap is created for improving cyber security and building a DevSecOps process. The service is based on OWASP SAMM v2 methodology.

DEVELOPMENT ENVIRONMENT Protection

Creating trusted repository

The repository being created uses an approach with a step-by-step verification of code downloaded from publicly available sources, using specialized tools from the leaders of the Russian cyber security market. Not only the code quality is checked, but also dependencies on other open-source software. Seamless integration into existing development processes, preparation of work regulations for IT and cyber security teams, training.

DEVELOPMENT ENVIRONMENT Protection

Kubernetes platform technical audit service (basic audit)

Technical audit of the Kubernetes microservice infrastructure configuration. This will provide expert assessment for further improvement of container application security level, ensure protection of microservices at the network level and their compliance with international requirements throughout the entire lifecycle.

DEVELOPMENT ENVIRONMENT Protection

Containerized applications and microservice environments protection service

Building in-depth protection of microservices throughout the entire lifecycle.

DEVELOPMENT ENVIRONMENT Protection

DevOps hardening service

Setting up and adjusting development tools based on Hardening Framework, which is a set of modules containing various international CIS Benchmark recommendations as well as templates for propagating configured customizations to the entire infrastructure.

DEVELOPMENT ENVIRONMENT Protection

Security audit and/or development of standard for technology platforms secure configuration.

Configuration audit of your DevOps infrastructure, such as Kubernetes, Docker, Openshift, Nginx, and implementation of Hardening Framework tool. This configures infrastructure components under the internal requirements and international cyber security recommendations, as well as builds DevSecOps process correctly.

CONSULTING DEVSECOPS

Secure DevOps processes

To build a secure DevSecOps development process, we use technologies included in the Russian software registry and open-source tools. We examine the infrastructure and determine the project boundaries to build DevSecOps processes, conduct a security audit of development processes and interview the team. We generate a detailed report on the current state of development processes security and create recommendations for building DevSecOps processes, as well as a roadmap for development process security, indicating bottlenecks and a plan to eliminate identified deficiencies.

Creating Secure Network Infrastructure

PERIMETER PROTECTION

Hardening system security

Assessing the risks of possible attacks on the network and implementing settings for specific methods of enhancing security level of the network infrastructure.

PERIMETER PROTECTION

Intrusion detection and prevention

Implementation and configuration of systems that provide intrusion detection and prevention.

PERIMETER PROTECTION

Protection against DDoS attacks

Implementation and configuration of systems that provide protection against DDoS attacks.

Hardening security

Audit of network and network information security systems

Updating existing or creating new network infrastructure map (L2-L3 diagram), conducting network inventory, auditing network equipment configurations. The data obtained is used to plan equipment modernization and rotation of existing foreign solutions. Work can also be carried out to configure equipment to enhance the security of systems.

Hardening security

Script development service for automating work with products via API / SSH

Development of tools to automate data transfer between systems (for example, SIEM and FW), transfer of rules between network equipment from different manufacturers.

Hardening security

Инвентаризация

Точное понимание физической и логической архитектуры компьютерной сети позволяет решить многие технические проблемы, оптимизировать администрирование и загрузку сетевого оборудования, контролировать безопасность.

Инвентаризация компьютерной сети включает в себя сбор информации обо всех объектах сети, их состоянии, местоположении, связи между собой и других важных характеристиках.


Этапы проекта:
  • идентифицируем все устройства, подключенные к сети;
  • разрабатываем таблицы оборудования с указанием инвентаризационных данных о нем;
  • разрабатываем схемы расположения этих устройств с указанием их местоположения и способов подключения друг к другу;
  • описываем используемые протоколы и технологии для передачи данных между устройствами;
  • определяем, какие устройства подключены к Интернету и как именно осуществляется подключение.

Hardening security

Load and functional testing of information protection equipment

Conducting load and functional testing of Anti-DDoS, IPS and FW class solutions by targeting traffic through information security tools.

PROTECTION INSIDE THE PERIMETER

Проектирование архитектуры сети и сетевых СЗИ

В контексте современных потребностей бизнеса создание надежной архитектуры сети и систем защиты информации (СЗИ) становится ключевым аспектом обеспечения безопасности и эффективности работы организации. При проектировании архитектуры сети и СЗИ мы учитываем разнообразные факторы, в том числе потенциальные угрозы безопасности, требования к производительности, гибкость и масштабируемость сетевых решений. Услуга включает в себя разработку сетевых схем, выбор подходящих технологий и архитектурных решений, а также реализацию мер безопасности, таких как сегментация сети, межсетевые экраны, системы обнаружения вторжений и системы шифрования данных. Результат — задокументированный проект надежной и устойчивой сетевой инфраструктуры, способной обеспечить защиту информации и эффективное функционирование бизнес-процессов.

PROTECTION INSIDE THE PERIMETER

Perimeter and internal network segments protection

Implementation of any network security tool on the working network infrastructure: VPN, GOST VPN, NGFW/UTM, IPS, DDoS, LB, SSL/TLS Offload, etc.

PROTECTION INSIDE THE PERIMETER

Behavior traffic analysis

Analysis of network traffic and telemetry data collected from the most important network sections.

PROTECTION INSIDE THE PERIMETER

Traffic balancing

Systems for balancing incoming traffic between servers for optimal load distribution between servers. This allows you to carry out a number of checks for requests entering servers, as well as manipulation of response traffic, for example, substituting additional fields in HTTP pages. These systems have a rich set of various options for grouping servers and balancing methods from Round Robin – transferring each next request to the next server, up to mixed methods that take into account server load, the number of open sessions and based on priority.

PROTECTION INSIDE THE PERIMETER

Communication channels protection

Implementation of encrypted tunnels certified according to GOST to protect dedicated or public communication channels between sites. The systems are devices with pre-installed cryptographic software running on top of IP networks at the L3 level.

Creating Information Protection Systems

INFRASTRUCTURE PROTECTION

Cloud infrastructure security level audit service (Cloud Security)

Raising the level of cloud infrastructure information security by conducting an audit with an assessment based on Cloud Security Alliance industry best practices and developing a roadmap and implementing the necessary measures or implementing solutions.

INFRASTRUCTURE PROTECTION

Targeted attacks protection

Set of measures and solutions that provide additional control of incoming documents, continuous data collection and endpoint monitoring and honeypot placement.


INFRASTRUCTURE PROTECTION

Virtualization environment protection

Protection of virtual machines from malware, as well as implementation of access control for users and administrators at the virtual machines and hypervisors level.


COMPREHENSIVE INFORMATION PROTECTION SYSTEMS

Comprehensive information protection for automated process control systems (APCS)

Creation of system for ensuring information security of automatic process control systems under the requirements of Order No. 239 of FSTEC of Russia as of December 25, 2017 and Order No. 31 of FSTEC of Russia as of March 14, 2014.


COMPREHENSIVE INFORMATION PROTECTION SYSTEMS

Comprehensive information protection in credit and non-credit financial institutions

Creation of information security system in financial organizations, which are subject to the following requirements:

   - GOST R 57580.1-2017, Bank of Russia Regulation No. 747-P (introduced to replace 672-P) using the GOST R 57580.2-2018 methodology;

   - No. 161-FZ as of June 27, 2011;

   - Requirements of STO BR IBBS, STO BR BFBO standards and RS BR IBBS Bank of Russia recommendations;

   - Other requirements and provisions.


COMPREHENSIVE INFORMATION PROTECTION SYSTEMS

Обеспечение комплексной защиты информации в соответствии с международными и государственными (национальными) стандартами России

Создание комплексной системы защиты в соответствии с международными и государственными (национальными) стандартами России в области информационной безопасности. 

COMPREHENSIVE INFORMATION PROTECTION SYSTEMS

Comprehensive protection of information of CII, SIS, PDIS objects.

Creation of a system for ensuring information security of data processed in various information systems under the regulator requirements.

DATA PROTECTION

Confidential data masking service

Protection from unauthorized access by masking data or creating anonymized copies.

DATA PROTECTION

Management access for unstructured data service

Automation of auditing data in the file system, searching for access violations and tracking changes in critical documents.

DATA PROTECTION

Защита API трафика(внедрение)

Обеспечение безопасного взаимодействия сервисов и пользователей, использующих программные интерфейсы API.

DATA PROTECTION

Management access for unstructured data service.

Monitoring and analysis of user or application activity when connecting to database management systems (DBMS).

DATA PROTECTION

Контроль распространения данных ограниченного доступа

Предотвращение утечки конфиденциальных данных в корпоративной сети.

PROTECTION OF END DEVICES (WORKSTATIONS)

Protection of workstations, user experience with mobile corporate devices.

Antivirus protection, application and peripheral device control, disk encryption, MDM and EMM solutions for mobile devices.

USER PROTECTION AND CONTROL

User privileged user access management

Control and monitoring of privileged users activity, including recording sessions and monitoring working time.

Try it out

Let’s talk about how to improve the security and efficiency of your IT and cyber security systems