Cyber Assessment and Security Maturity - Datasheet (Revised) - Controlled
Cyber Assessment and Security Maturity - Datasheet (Revised) - Controlled
Cyber Assessment and Security Maturity - Datasheet (Revised) - Controlled
Securing Your Cyber Defense With CIS Top 20 Controls | Making Your Security
Scalable With CIS Top 20 Controls
Datasheet
Ongoing assessments adopt a systematic approach to A one-time security gap assessment offers a single
evaluate your current cybersecurity measures. Di8it thorough examination of your cybersecurity setup by
uses CIS controls to identify vulnerabilities and gaps in our experienced security consultants.
your security. A one-time assessment helps visualize your current
Our regular monitoring and testing of your infrastruc- cybersecurity situation to develop a scalable plan that
ture enables us to keep you updated about latent accounts for future growth.
vulnerabilities and security updates needed to improve The assessment can be conducted on-site or remotely
your threat-detection, incident-response protocols, and as needed.
scanning tools.
While one-time assessments help establish the current
Assessments can take place remotely, on-site, or a state of an organization’s cybersecurity and identify the
combination of both as required. steps needed for compliance, an ongoing assessment
is better at testing the effectiveness of your controls as
your security needs evolve.
2 8 13 18
Inventory of Authorized and Malware Defenses Data Protec�on Applica�on So�ware
Unauthorized Devices Security
3 9 14 19
Secure Configura�on for Limita�on and Control of Controlled Access Based on Incident Response and
Hardware and So�ware on Network Ports, Protocols, the Need to Know Management
Mobile, Laptops, Worksta�on and Services
and Servers
4 10 15 20
Con�nuous Vulnerability Data Recovery Capabili�es Wireless Access Control Penetra�on Tests and Red
Assessment and Remedia�on Team Exercises
5 11 16
Controlled Use of Secure Configura�on for Account Monitoring and
Administra�ve Privileges NetworkDevices such as Control
Firewalls, Routers, and
Switches
6
Maintenance, Monitoring, and
Analysis of Audit Logs
About Di it
Di8it by Digit Labs is a Cyber Security Consultancy specializing in Information Security Services including but not limited to
Offensive, Adversary, Advisory, and Managed Security Services. We believe in tailoring the requirements of our customers and
understand that one solution does not fit all. As Security specialists, we cut through the oddities that can obstruct the velocity of
work & ensure an agile and effective service delivery.