Security Testing

The Foundation of Your Security 

Anitian’s team pinpoints your problems before the attackers do, with holistic techniques for testing systems, networks, and applications. Through 20 years of penetration testing, our team has built a gigantic playbook of tools and tactics. 

Risk Ready

Every security testing report we deliver includes an integrated risk assessment to focus you on the most serious threats to you.

Focused

You need answers fast. We isolate and interpret the data you need to act by condensing complex information for you.

Rational

Our findings are based on a rational analysis of concrete evidence, backed with scientific testing and peer review.

DevOps Ready

Our team integrates directly with your DevOps people, ensuring rapid remediation of the vulnerabilities we find.

Security Testing Details

Penetration Testing: Overview

Penetration testing is one of the foundational components of a security program. However, not all tests are identical. Anitian believes that a good penetration test focuses you on the most significant threats you face.

Our Ring.Zero technique is a holistic, scientific, multi-dimensional approach that locates vulnerabilities quickly, and then places them in a risk management framework. The Ring.Zero methodology is unique to Anitian, and has served thousands of clients worldwide

All our penetration testing services follow Anitian’s exclusive Ring.Zero Testing Methodology.

Each engagement with Anitian begins with a deep, technical and operational understanding of your business. We carefully scope the project, establish clear rules of engagement, and define communication channels. As our team executes the tests, we look beyond the output from tools to consider the deeper implications to your business.

Our reports are concise, direct, and focused. While many penetration testers want to impress you with their hacking skills, our team will impress you with valuable intelligence you can use to defend your business, your data, and your job.

CLOUD PENETRATION TESTING

Know before the breach. A cloud infrastructure penetration test provides objective insights into the vulnerabilities and misconfigurations of your AWS or Azure infrastructure.

Your Cloud Penetration Testing includes:

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Asset inventory and validation
  • Cloud architecture review with your team
  • Reconnaissance of in-scope assets
  • Performance of automated scans
  • Validation and analysis of scan results
  • Performance of manual exploit testing
  • Validation and analysis of manual exploit results
  • Assessment of risks using Anitian’s RiskNow® approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation activities
NETWORK PENETRATION TESTING

Test network infrastructure for vulnerabilities. Anitian has over 20 years of experience testing networks. Our expertise with deploying network infrastructure is extremely valuable for this work. We have a huge library of custom scripts and techniques we have amassed over the years specifically designed to test network equipment for known weaknesses.  Your Network Penetration Testing includes:

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Asset inventory and validation
  • Network architecture review with your team
  • Reconnaissance of in-scope assets
  • Performance of automated scans
  • Validation and analysis of scan results
  • Performance of manual exploit testing
  • Validation and analysis of manual exploit results
  • Assessment of risks using Anitian’s RiskNow approach
  •  Documentation of findings and recommendations in a peer-reviewed report
  • Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation activities
WEB APPLICATION PENETRATION TESTING

Hack your apps before the hacker does. A web application test delves deep into your applications, APIs, and web services to find vulnerabilities hackers might attack. An integrated risk assessment focuses you on those issues that are most likely to be exploited.  Your Web Application Penetration Testing includes:

  •  Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Asset inventory and validation
  • Application architecture review with your team
  • Reconnaissance of in-scope applications and APIs
  • Performance of automated scans
  • Validation and analysis of scan results
  • Performance of manual exploit testing
  • Validation and analysis of manual exploit results
  • Assessment of risk using Anitian’s RiskNow®approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation activities
APPLICATION PROGRAMMING INTERFACE (API) TESTING

An API test can ensure that your programmatic interfaces do not provide a conduit for attack or theft. Anitian’s Ring.Zero team can test REST, SOAP, and RPC APIs.  API Testing includes:

  •  Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Documentation and schema review
  • Reconnaissance of in-scope APIs
  • Performance of automated scans
  • Attack surface determination
  • Parameter and method testing
  • Authentication testing
  • Fuzzing and brute forcing
  • Validation and analysis of data gathered
  • Assessment of risks using Anitian’s RiskNow® approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Collaboration with your team on remediation activities
WIRELESS PENETRATION TESTING

A wireless penetration test is a deep, technical assessment of your wireless infrastructure. Anitian goes beyond simple scans to conduct a thorough review of your wireless configuration.   Your Wireless Penetration Testing includes:

  •  Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Asset inventory and validation
  • Wireless network architecture review with your team
  • Reconnaissance of in-scope access points and SSIDs
  • Performance of automated scans, including:
    • War driving/walking
    • Encryption cracking
    • Man-in-the-Middle testing
    • Rogue access point detection
    • Network segmentation testing
  •  Validation and analysis of scan results
  • Performance of manual exploit testing
  • Validation and analysis of manual exploit results
  • Assessment of risks using Anitian’s RiskNow approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation activities
OVERVIEW: DIGITAL FORENSICS AND INCIDENT RESPONSE
When a breach happens, Anitian is at your side. From digital forensics to complete postincident analysis, Anitian can restore operations and determine the root cause to help your business recover quickly. Anitian can work on- or off-site to establish a chain of custody, capture forensically sound images, and store data for analysis. Anitian has an extensive library of commercial, open source, and home-grown tools to analyze data.
ON-DEMAND INCIDENT RESPONSE SERVICES

If you suspect a breach, call Anitian. We can provide complete IR and forensic support to preserve evidence, establish root cause, and prevent further attacks.  Incidents Anitian can investigate include:

 

  • Data breach from hacking, malware, or ransomware
  •  Employee theft, misuse, and blackmail
  •  Industrial or nation-state espionage
  •  Payment card abuse or theft
  •  Mobile device theft, breach, or misuse
  • Insider threats
  • Suspicious employee behavior or threats

 

Your IR engagement can include:

 

  • Acquisition of forensically sound images of affected systems
  • Acquisition of supporting log, event, and informational data
  •  Interviews of relevant staff
  •  Investigation of the incident, establishing the root cause
  • Attribution of the attack if possible, with subsequent investigation of involved threat actors
  • Establishment of a legal chain of custody
  • Storage of forensic images for up to 12 months
  • Collaboration with law enforcement and legal counsel
  • Assessment of the business risks and qualification of those risks
  • Development of an incident response report
  • Provision of guidance and recommendations to avoid similar incidents in the future
INCIDENT RESPONSE RETAINER

An IR retainer establishes the contractual framework needed to allow Anitian to respond instantly to a suspected breach.  Your Incident Response Retainer includes:

 

  • On-demand investigation, analysis, or review of suspicious activity
  • Service level agreements for on-site work
  • A discounted rate for IR work
  • Integration with your IR escalation plan
INCIDENT RESPONSE PROGRAM ASSESSMENT

Looking to assess the effectiveness of your IR program? Anitian offers a complete set of IR testing services, including control strength effectiveness and tabletop incident exercises.

APPLICATION SECURITY: OVERVIEW

Applications are where hackers and defenders fight the most battles. The security of your entire business may rest on a few lines of code. Anitian’s application security practice takes a holistic, creative, and aggressive view of application security. We work side-byside with your people to weave security into every fiber of your DevOps processes. Mostly, we empower our people to think creatively about your business and your applications. Let Anitian hack your app before the hacker does.

WEB APPLICATION ARCHITECTURE ASSESSMENT

This service provides a deep technical assessment of the application architecture. How an application is hosted can have a profound impact on its security.   This service includes a comprehensive security analysis of the following components:

 

  • Hosting environment (AWS, co-location, etc.)
  • Security controls (firewalls, IDS/IPS, etc.)
  • Network design and architecture
  • System and configuration management
  • Data and communication encryption
  • Network and application layer protocols
  • Operations management and monitoring
  • Application architecture (web tier, application tier, database, etc.)
  • Data security techniques

 

Your web application architecture assessment includes:

 

  • Formal project management, with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Asset inventory and validation
  • Hosting architecture walk through with your team
  • Application architecture walk through with your team
  • Review of relevant configurations
  • Documentation review
  • Focused assessments of security controls
  • Performance of automated scans where appropriate
  • Validation and analysis of results
  • Perform risk assessment
  • Documentation of findings and recommendations in a peer-reviewed report
  • Results presented and recommendations discussed with you and your team
  • Collaboration with your staff on remediation efforts
  •  

A Web Application Architecture Assessment is typically (and ideally) performed in conjunction with a web application and/or systems penetration test. When performed together, Anitian can not only review the architecture for vulnerabilities, but actively test those vulnerabilities. This provides a more comprehensive and objective view of your overall security.

WEB APPLICATION PENETRATION TESTING

Hack your apps, before a hacker does. Anitian has over 20 years of experience testing applications. In that time, we have stockpiled a huge library of testing code. When we test your applications, we go beyond automated scanning to look at your apps like a hacker would.

 

Your web application penetration test includes:

 

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Asset inventory and validation
  • Application architecture review with your team
  • Reconnaissance of in-scope applications or APIs
  • Performance of automated scans
  • Validation and analysis of scan results
  • Manual exploit testing
  • Validation and analysis of manual test results
  • Assessment of issues against the OWASP Top 10.
  • Assessment of risk using Anitian’s RiskNow® approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Results presented and recommendations discussed with you and your team
  • Collaboration with your staff on remediation efforts
  • Collaborate with your staff on remediation efforts
APPLICATION PROGRAMMING INTERFACE (API) TESTING

An API test can ensure that your programmatic interfaces do not provide a conduit for attack or theft. Anitian’s Ring.Zero team can test REST, SOAP, and RPC APIs.   API testing includes:

 

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Documentation and schema review
  • Reconnaissance of in-scope API
  • Performance of automated scan
  • Validation and analysis of scan results
  • Attack surface determination
  • Parameter and method testing
  • Authentication testing
  • Fuzzing and brute forcing
  • Validation and analysis of test data
  • Documentation of findings and recommendations in a peer-reviewed report
  • Results presented and recommendations discussed with you and your team
  • Collaborate with your staff on remediation efforts
SOURCE CODE REVIEW

A source review finds security vulnerabilities in your applications before a hacker does. Anitian’s application security team conducts a regimen of automated and manual code assessments to find common application vulnerabilities, including SQL injection, authentication and session management, cross-site scripting, and insecure storage. Code review is ideal for identifying more subtle, nuanced vulnerabilities within an application. Anitian can also provide feedback on coding best practices.   A typical source code review project includes:

 

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Application architecture review with your team
  • Code walkthrough with developers
  • Performance of automated code scans
  • Validation and analysis of scan results
  • Third party component review
  • Manual exploit testing
  • Validation and analysis of manual test results
  • Assessment of issues against the OWASP Top Ten vulnerabilities
  • Documentation of findings and recommendations in a peer-reviewed report
  • Results presented and recommendations discussed with you and your team
  • Collaboration with your staff on remediation efforts
Ring.Zero METHODOLOGY

Anitian’s Ring.Zero team uses this methodology for all our testing services. It is a variation on widely used methodologies, such as the OWASP methodology. Anitian adapts our approach for each service offering. when appropriate.

The steps in our methodology include four phases:

PHASE 1 – Reconnaissance: In this phase, we prepare for the testing.

  • Scope Validation: Ensure that both parties know exactly what is being tested and when.
  • Information Gathering: Our testers review the target assets and gather crucial information about their function, purpose, and usage. This may involve reviewing architecture diagrams or network data flows.
  • Enumeration: Light scanning that may include system fingering printing, share enumeration, site spidering, and/or web application API schema validation.
  • Research: Investigate any dimension of the target environment for possible attack vectors. Sometimes this involves searching hacking sites and “dark web” boards for the latest techniques, tactics, and vulnerabilities.

PHASE 2 – Scanning: In this phase we conduct a series of automated scans from our Ring.Zero testing platform.

  • Vulnerability Identification: Automated scans using commercial and open-source scanning tools. This gives us a reliable baseline for analysis.
  • Attack Planning: Based on the results of the vulnerability scans, we formulate an plan for executing the test. This is the “hypothesis” stage of our scientific methodology. Our people theorize the best possible ways to exploit the targets.
  • Vulnerability Validation: Using automated tools, we validate key vulnerabilities or information exposure, to ensure our attack plan will work.

PHASE 3 – Testing: In this phase, the Ring.Zero team uses the vulnerability and reconnaissance data to run a series of manual exploit tests. This phase may iterate many times as the tester gains access to additional systems or applications.

  • Exploit testing: We attempt to exploit vulnerabilities discovered and gain access to systems, data, or networks.
  • Credential testing: If we obtain credentials, we test those on target systems to validate their rights and access levels.
  • Infiltration: Once we are inside a protected system or application, we assess the level of access we have.
  • Privilege Escalation: The tester attempts to gain additional access to other systems, applications, or data. This is also called pivoting.
  • Exfiltraton: If we can gain access to sensitive data, we determine if that data can be removed from the environment.

 

PHASE 4 – Analysis: The final stage, the Ring.Zero team analyzes the results.

 

  • Data Normalization: security testing generates a lot of disparate data. Using our exclusive Ring.Zero testing platform, we normalize all the data into a consistent format, to ensure every detail is considered.
  • Risk Assessment: Using our exclusive RiskNow approach, our team analyzes the vulnerabilities in context to the threat they pose your business. This ensures our results focus on tangible, likely, and credible threats.
  • Reporting: The final stage is to document our findings, recommendations, and insights. This is where Anitian’s Ring.Zero team departs significantly from your typical penetration testing firm. Our reports our concise, business-oriented briefings that focus you on the most serious issues your business faces. While we include complete technical details as an appendix, our reports are something a CIO or CEO could read, understand, and use to make data-driven, rational decisions.
SECURE CODE REVIEW: OVERVIEW

Lurking deep inside the source code of your applications are vulnerabilities no scanner can see. Code flaws can represent one of the most serious threats to your business. A Secure Code Review can dig deep into your code. We can spot flaws before the hacker does, and keep you ahead of the threat.

SOURCE CODE REVIEW

A source review finds security vulnerabilities in your applications before a hacker does. Anitian’s application security team conducts a regimen of automated and manual code assessments to find common application vulnerabilities, including SQL injection, authentication and session management, cross-site scripting, and insecure storage. Code review is ideal for identifying more subtle, nuanced vulnerabilities within an application. Anitian can also provide feedback on coding best practices.   A typical source code review project includes:

 

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Application architecture review with your team
  • Code walkthrough with developers
  • Performance of automated code scans
  • Validation and analysis of scan results
  • Third party component review
  • Manual exploit testing
  • Validation and analysis of manual test results
  • Assessment of issues against the OWASP Top Ten vulnerabilities
  • Documentation of findings and recommendations in a peer-reviewed report
  • Results presented and recommendations discussed with you and your team
  • Collaboration with your staff on remediation efforts
APPLICATION PROGRAMMING INTERFACE (API) TESTING

An API test can ensure that your programmatic interfaces do not provide a conduit for attack or theft. Anitian’s Ring.Zero team can test REST, SOAP, and RPC APIs.

 

API testing includes:

 

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Documentation and schema review
  • Reconnaissance of in-scope API
  • Performance of automated scan
  • Validation and analysis of scan results
  • Attack surface determination
  • Parameter and method testing
  • Authentication testing
  • Fuzzing and brute forcing
  • Validation and analysis of test data
  • Assessment of risk using Anitian’s RiskNow® approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Results presented and recommendations discussed with you and your team
  • Collaborate with your staff on remediation efforts
CONFIGURATION ANALYSYS: OVERIVEW
Hidden deep inside switches, firewalls, and servers is a ticking timebomb: a simple misconfiguration vulnerability. Maybe a hacker will never find it…or maybe they already have. Keeping systems properly configured is challenging in a dynamic IT environment. Moving workloads to the cloud only makes this issue more complex. Anitian offers a complete suite of configuration analysis services. We are uniquely qualified to analyze the security of infrastructure and system components. Our history as a security integrator and a managed security provider give us hands-on expertise with routers, NGFW, SIEM, wireless networks, and more. Not only can we recommend security improvements, but help improve performance and stability.
CONFIGURATION ASSESSMENT

A deep security and best practices analysis of the configuration of any system in your environment.  Typical systems we assess include:

 

  • Servers of all types: virtualized, cloud, or physical
  • Desktops, laptops, smartphones, mobile devices
  • Internet of Things (IoT) devices
  • Switches, routers, load balancers, and other network equipment
  • SANs and storage solutions
  • WAN, SD-WAN and remote access technologies
  • NGFWs, physical or virtualized
  • Web proxies
  • Wireless network controllers
  • Endpoint security management
  • Encryption technologies
  • Active directory
  • Application delivery platforms
  • AWS or Azure services
  • Cloud platforms (Office 365, Salesforce, etc.)
  •  Application hosting platforms, like WordPress

 

A Ring.Zero configuration assessment includes:

 

  • Formal project management using Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Performance of a walkthrough with your team to validate in-scope assets
  • Gathering and review of relevant configurations
  • Review of associated technical documentation
  • Automated scans of configurations using Anitian’s exclusive Ring.Zero testing platform
  • Validation and analysis of results
  • Manual review of configurations
  •  Assessment of risk using Anitian’s RiskNow®approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation efforts
CLOUD ARCHITECTURE ASSESSMENT

An expert assessment of your current or proposed AWS or Azure cloud architecture, including the use of cloud services like IDM or encryption. We look at not only security issues, but also all cloud best practices. A Cloud Architecture Assessment includes:

 

  • Discussion of business, technical, operational, performance, availability, and security needs
  • Review of current VPCs and availability zone usage
  • Assessment of access controls currently in place
  • Assessment of data storage practices (S3, glacier, etc.)
  • Review of key management practices
  • Review of AWS service usage (CloudWatch, RDS, CloudTail, etc.)
  • Review of policies, procedures and standards applicable to AWS administration and security
  • Assessment of Internet and remote access
  • Assessment of third party technologies (firewalls, IPS, anti-malware, etc.) in use
  • Design of recommended architecture and service usage in alignment with stated requirements and future growth projections
  • Assessment of risk using Anitian’s RiskNow®approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Complete reports and conduct peer review
  •  Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation efforts
CLOUD ARCHITECTURE ASSESSMENT: OVERVIEW

Moving applications and workloads to the cloud has numerous benefits. For the most part, cloud environments are more secure. However, on-prem security does not always translate directly to the cloud. Anitian’s Cloud Security services ensure that your cloud environments are secure, using the latest techniques. Our cloud experts can assess every dimension of your cloud infrastructure, including third party technologies, user authentication, encryption, and storage.

CLOUD ARCHITECTURE ASSESSMENT

An expert security and design assessment your current or proposed cloud environment(s). We focus on carefully assessing all dimensions of your cloud architecture including business, operational, performance, and security needs.  This service includes:

 

  • Formal project management with Anitian’s exclusive Vision Client Engagement Portal
  • Discussion of business, security, operational, performance, availability, and future growth needs with key stakeholders
  • Review of current VPCs and availability zone usage
  • Assessment of in-place access security and access controls
  • Assessment of data storage practices (S3, glacier, etc.)
  • Review of key management practices
  • Review of AWS service usage (CloudWatch, RDS, CloudTail, etc.
  • Review of policies, procedures and standards applicable to AWS administration and security.
  • Assessment of Internet and remote access
  • Review of DevOps practices with your development team
  • Assessment of software development lifecycle practices
  • Assessment of third party technologies (firewalls, SIEM, AMIs, etc.) in use
  • Scanning relevant systems or environments using Anitian’s Ring.Zero testing platform
  • Development of recommended architecture based on stated requirements and expected future growth
  • Assessment of risk using Anitian’s RiskNow® approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation efforts
CLOUD SECURITY ASSESSMENT

A focused assessment your current or proposed cloud environment security controls. This service focuses on security aspects of your cloud.  This service includes:

 

  • Formal project management with Anitian’s exclusive Vision Client Engagement Portal
  • Discussion of business, security, operational, performance, availability, and future growth needs with key stakeholders
  • Review of current VPCs and availability zone usage
  • Assessment of in-place access security and access controls
  • Assessment of data storage practices (S3, glacier, etc.)
  • Review of key management practices
  • Review of AWS security services in use (WAF, IDM, etc.)
  • Review of policies, procedures and standards that are applicable AWS administration and security
  • Assessment of Internet and remote access
  • Assessment of third party security technologies (NGFW, SIEM, anti-malware, etc.) in use
  • Scanning relevant systems or environments using Anitian’s Ring.Zero testing platform
  • Development of recommended architecture based on stated requirements and expected future growth
  • Assessment of risk using Anitian’s RiskNow® approach
  • Documentation of findings and recommendations in a peer-reviewed report
  • Presentation of results and discussion of recommendations with you and your team
  • Collaboration with your staff on remediation efforts
SOCIAL ENGINEERING: OVERVIEW
Social engineering provides a window on the effectiveness of a security program. Unfortunately, many security firms engage in “gotcha” style testing. They focus on the cleverness of the tester and their ability to trick people. These tests look through the wrong windows, and tell you almost nothing about the effectiveness of your security program.   Anitian is the only security firm to use scientific methods for our social engineering. Our results are objective, fair assessments of your security program, and not a forum for our people to show off. We work with you to identify specific policies to test, then craft a testing regimen that fairly evaluates your people. Moreover, we use control groups and statistical sampling methods to minimize false information. An Anitian Social Engineering test arms you with objective data so you can make rational decisions about improving your security policies.
PHYSICAL

A scientifically sound test of your physical access controls. Anitian takes special care to build physical testing regimens that fairly and objectively assess company policies. Furthermore, we can assess not only physical controls like doors or cameras, but also access to IT resources, such as unprotected network ports.   Your Physical Social Engineering test includes:

  • Setup Phase
    • Formal project management with Anitian’s exclusive Vision Client Engagement Portal
    • Walkthrough of existing physical access policies and controls
    • Development of a testing regimen in collaboration with your team
    • Identification and validation of targets
    • Obtaining approvals and clearance to conduct tests
    • Definition of guidelines to ensure the scientific validity of testing protocols
  • Reconnaissance Phase
    • Gathering of relevant intelligence on targets
    • A survey of physical sites
    • Tuning of testing protocols and preparation to test
  • Testing Phase
    • Attempt to gain physical access to test locations using a predetermined ruse
    • Infiltration, privilege escalation and exfiltration analysis
  • Analysis Phase
    • Documentation and contextualization of findings and results
    • Classification of attack scenarios and vulnerabilities
    •  Assessment of risks using Anitian’s RiskNow® approach
    •  Documentation of findings and recommendations in a peer-reviewed report
    •  Presentation of results and discussion of recommendations with you and your team
    • Collaboration with your staff on remediation efforts

The end result, fair results you can trust to make rational decisions about your physical security.

EMAIL “PHISHING”

Test how your people respond to a suspicious email. Anitian focuses on email testing that provides empirical evidence of security issues, not hype and speculation. Each test we perform is custom built for your business, your people, and your policies.   You can choose from different types of email social engineering tests:

  • Credential phish: campaign to evaluate if employees will disclose sensitive authentication information
  • PHI phish: a focused campaign around protected health information
  • Financial phish: techniques to trick employees into disclosing financial data, such as routing numbers
  • Click phish: a test to determine if employees will click on suspicious content
  • Trusted vendor phish: regimen that assesses policies surrounding trusted vendors, such as staffing agency
  • Malware phish: a variant on the click phish, where we assess if the employee will not only click on suspicious content, but also allow us to install a executable on the endpoint

All email phishing tests follow our Ring.Zero email social engineering methodology:

  • Setup Phase
    •  Formal project management with Anitian’s exclusive Vision Client Engagement Portal
    • Walkthrough with your team to discuss policies and controls currently in place
    • Development of a testing regimen in collaboration with your team
    • Identification and validation of targets
    • Obtaining approvals and clearance to conduct tests
    • Definition of a control group to ensure scientific validity of testing protocols
    • Configuration of the email testing platform to execute tests
  • Testing Phase
    • Performance of the phishing campaign, with collation of testing data
    • Validation of the integrity of testing data
  • Analysis Phase
    •  Documentation and contextualization of findings and results
    •  Classification of attack scenarios and vulnerabilities
    •  Assessment of risks using Anitian’s RiskNow® approach
    • Documentation of findings and recommendations in a peer-reviewed report
    • Presentation of results and discussion of recommendations with you and your team
    • Collaboration with your staff on remediation efforts

The end result, fair results you can trust to make rational decisions about your email security.

TELEPHONE “VISHING”

How do your employees handle suspicious phone calls? With an Anitian Telephone Social Engineering test, you have objective, scientifically valid data. This allows you to make informed, rational decisions about training and security policies.   Your Telephone Social Engineering test includes:

  • Setup Phase
    •  Formal project management with Anitian’s exclusive Vision Client Engagement Portal
    • Walkthrough with your team to discuss policies, practices, and concerns currently in place
    • Development of a testing regimen in collaboration with your team
    • Identification and validation of targets
    • Obtaining approvals and clearance to conduct tests
    • Definition of a control group to ensure scientific validity of testing protocols
    • Anitian team briefing on testing protocols
  • Testing Phase
    • Performance of calling campaign, with collation of testing data
    • Validation of the integrity of testing data
  • Analysis Phase
    •  Documentation and contextualization of findings and results
    •  Classification of attack scenarios and vulnerabilities
    • Assessment of risks using Anitian’s RiskNow® approach
    • Documentation of findings and recommendations in a peer-reviewed report
    • Presentation of results and discussion of recommendations with you and your team
    • Collaboration with your staff on remediation efforts

The end result: fair results you can trust to make rational decisions about your personnel and telephone security policies.

DARK WEB INVESTIGATION

The Internet is full of information. Hackers do not always need to steal data from you. The “dark web” is a collection of nefarious sites, boards, and groups that trade in contraband data. When a hacker wants to attack your business, they often tap into this resource to obtain sensitive data. Anitian’s Ring.Zero team can conduct a thorough investigation into this world and determine if any of your data is out there.   Your Dark Web Investigation uses the following methdology:

  • Setup Phase
    • Formal project management with Anitian’s exclusive Vision Client Engagement Portal
    • Collaboration with you and your staff to discuss your concerns and establish a project scope
    • Development of an investigation approach o Identification and validation of targets
    • Configuration of the investigation environment
  • Investigation Phase
    • Conduct searches
    • Make connections with data brokers
    • Gather data, validate its integrity
  • Analysis Phase
    • Documentation and contextualization of findings and results
    • Classification of attack scenarios and vulnerabilities
    • Assessment of risks using Anitian’s RiskNow® approach
    • Documentation of findings and recommendations in a peer-reviewed report
    • Presentation of results and discussion of recommendations with you and your team

The end result, you have a clear view of what kinds of data are available on the dark web and can make rational decisions about your information security practices.

VULNERABILITY SCANNING SERVICE: OVERVIEW

Our cloud-based vulnerability scanning service delivers actionable intelligence.

Get ahead of the threats with continuous, risk-based vulnerability management. While most platforms overwhelm you with data, Anitian’s vulnerability management service distills that data into actionable intelligence. Our cloud-based scanning platform can continuously monitoring anything, on-premise or in the cloud, for vulnerabilities. When new issues emerge, our team analyzes them in context to the threat they pose to your business.

MANAGED VULNERABILITY SCANNING

Continuous, cloud-based scanning, using Anitian’s exclusive combination of commercial tools, like Nessus, and our customized scripts developed over 23 years of information security work.  This service includes:

 

  • Cloud-based scanning platform
  • Fully managed, we take care of all the details.
  • Integrated RiskNow® risk assessments
  • Quick setup – you are online in hours, not days
  • Unlimited scans, with no per-use charges
  • Quick, fully-automated deployment
  • Direct integration with DevOps
  • 24-hour support
  • Detailed remediation assistance
  • Contextualization of data based on your business, your data, and your threat profile
  • Actionable threat intelligence focuses you on the vulnerabilities that pose the greatest threat to your business
MANAGED WEB APPLICATION VULNERABILITY SCANNING

Cloud-based scanning platform provides continuous assessment of your web applications, with on-demand remediation assistance.   Your web application vulnerability scanning service includes:

 

  • Formal project management with Anitian’s Vision Client Engagement Portal
  • Detailed scoping and rules of engagement
  • Asset inventory and validation
  • Application architecture review with your team
  • Reconnaissance of in-scope applications or APIs
  • Performance of automated scans
  • Validation and analysis of scan results
  • Assessment of issues against the OWASP Top 10.
  • Assessment of risk using Anitian’s RiskNow® approach
  • Contextualization of data based on your business
  • Actionable vulnerability intelligence focuses your team on the issues that present the most serious threat to your business
  • Collaborate with your staff on remediation efforts

Anitian’s Ring.Zero team uses this methodology for all our testing services. It is a variation on widely used methodologies, such as the OWASP methodology. Anitian adapts our approach for each service offering. when appropriate.

The steps in our methodology include four phases:

PHASE 1 – Reconnaissance: In this phase, we prepare for the testing.

  • Scope Validation: Ensure that both parties know exactly what is being tested and when.
  • Information Gathering: Our testers review the target assets and gather crucial information about their function, purpose, and usage. This may involve reviewing architecture diagrams or network data flows.
  • Enumeration: Light scanning that may include system fingering printing, share enumeration, site spidering, and/or web application API schema validation.
  • Research: Investigate any dimension of the target environment for possible attack vectors. Sometimes this involves searching hacking sites and “dark web” boards for the latest techniques, tactics, and vulnerabilities.

PHASE 2 – Scanning: In this phase we conduct a series of automated scans from our Ring.Zero testing platform.

  • Vulnerability Identification: Automated scans using commercial and open-source scanning tools. This gives us a reliable baseline for analysis.
  • Attack Planning: Based on the results of the vulnerability scans, we formulate an plan for executing the test. This is the “hypothesis” stage of our scientific methodology. Our people theorize the best possible ways to exploit the targets.
  • Vulnerability Validation: Using automated tools, we validate key vulnerabilities or information exposure, to ensure our attack plan will work.

PHASE 3 – Testing: In this phase, the Ring.Zero team uses the vulnerability and reconnaissance data to run a series of manual exploit tests. This phase may iterate many times as the tester gains access to additional systems or applications.

  • Exploit testing: We attempt to exploit vulnerabilities discovered and gain access to systems, data, or networks.
  • Credential testing: If we obtain credentials, we test those on target systems to validate their rights and access levels.
  • Infiltration: Once we are inside a protected system or application, we assess the level of access we have.
  • Privilege Escalation: The tester attempts to gain additional access to other systems, applications, or data. This is also called pivoting.
  • Exfiltraton: If we can gain access to sensitive data, we determine if that data can be removed from the environment.

PHASE 4 – Analysis: The final stage, the Ring.Zero team analyzes the results.

  • Data Normalization: security testing generates a lot of disparate data. Using our exclusive Ring.Zero testing platform, we normalize all the data into a consistent format, to ensure every detail is considered.
  • Risk Assessment: Using our exclusive RiskNow approach, our team analyzes the vulnerabilities in context to the threat they pose your business. This ensures our results focus on tangible, likely, and credible threats.
  • Reporting: The final stage is to document our findings, recommendations, and insights. This is where Anitian’s Ring.Zero team departs significantly from your typical penetration testing firm. Our reports our concise, business-oriented briefings that focus you on the most serious issues your business faces. While we include complete technical details as an appendix, our reports are something a CIO or CEO could read, understand, and use to make data-driven, rational decisions.

Learning Resources

Presentation

Security as
Code

b

Paper

Communicating Risk
to Leadership

eBook

The Case for Security
in the Cloud

Contact

Share This