fbpx

KCS Australia

Audit Brochure

DOWNLOAD

Interested?

We would love to speak to you

Audit Brochure

DOWNLOAD
  • 360 Audit
  • Firewall Audit
  • Penetration Testing

360 Audit covers the whole spectrum of your cyber security strategy which is your people, processes and technology. We analyse your maturity level within each of the border control areas so that you know. What are your biggest risks? Where you stand? What should be your focus area? The audit will help you when it comes to your business information security

IF YOU NEED TO FIND ORGANISATIONAL READINESS FOR INFORMATION SECURITY GET A 360 AUDIT. STRATEGIC AUDIT ABOUT YOUR ORGANISATION FOR COMPLETE SECURITY POSTURE.

360 Audit covers the whole spectrum of your cyber security strategy which is your people, processes and technology. We analyse your maturity level within each of the border control areas so that you know. What are your biggest risks? Where you stand? What should be your focus area? The audit will help you when it comes to your business information security

People: Employees

As humans are most often the weakest link, attackers are increasingly focused on hacking individuals rather than systems. KCS has a variety of partners who provide high quality, entertaining, online cybersecurity training to ensure people related threats are minimised.

Process: Security Strategy

Our security experts can assess and benchmark your security processes for your industry, size and demographic, then provide additional support where required.

Technology: Integrated Tools

As our reliance on interconnected data and devices increases, having the right perimeter protection is critical. Endpoint Protection, Data Loss Prevention, Data Backup and Recovery, Firewall, Intrusion Detection / Prevention System (IDS/IPS) is what KCS can help you with.

VAPT:

Vulnerability Assessment and Penetration Testing (VAPT) are both security services that specialise in identifying vulnerabilities within the network, server and system infrastructure.VA is a rapid automated review of network devices, servers and systems to identify key vulnerabilities and configuration issues that an attacker may be able to take advantage off. Whereas PA is an in-depth expert-driven activity focused on identifying various possible routes an attacker could use to break into the network.

GRC Maturity:

We assist you understand your obligations, risk and responsibilities in reference to the storage and dissemination of business data, providing continuous tracking of compliance in real-time. Also, protecting your environment, reducing the risks, prevention and mitigation of cyber-attacks.

Perimeter Network:

It is the secured boundary between the private and the locally managed side of a network, often a company’s intranet, and the public-facing side of a network, often the Internet. A perimeter network includes Border Routers, Firewalls, IDS, IPS, and DMZs

Avoid Breaches

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Achieve Compliance

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Improve Security

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Remediation:

Solution outline and quotes

IF YOU NEED TO FIND ORGANISATIONAL READINESS FOR INFORMATION SECURITY GET A 360 AUDIT. STRATEGIC AUDIT ABOUT YOUR ORGANISATION FOR COMPLETE SECURITY POSTURE.

Reports:

Maturity Score
High risks
Compliance risks

Firewall: Firewall is your gatekeeper to protect private business network and the intranet, from unauthorised access from the internet. Our audits help you identify weakness in your network security setup, while outlining desired security and policy controls.

FIREWALLS CAN’T MANGE ITSELF. OUR FIREWALL ADUIT HELPS YOU MANGE IT BETTER. FIREWALL NEEDS CONTINOIUS UPDATES AND MAINTENANCE BASED ON CHANGING SECURITY REQUIREMENTS.

Firewall: Firewall is your gatekeeper to protect private business network and the intranet, from unauthorised access from the internet. Our audits help you identify weakness in your network security setup, while outlining desired security and policy controls.

Firewall

Alignment of Security rules and controls with your Business Requirements.

Radius Integration:

Radius or LDAP integration provides granular reporting and compliance reporting while offering greater security controls. However, the design and implementation should conform to organisation security objectives.

Routing rules:

Though not a firewall function, routing rules in a Firewall should be carefully designed and implemented. Redundant and misconfigured routing rules in a firewall has a cost for the whole corporate network, while being a security exploit as well.

VPN Tunnels:

Remote work is being adopted by more and more organisations. To allow employees and partners to securely connect to the corporate network, VPN tunnels are employed. However, VPN tunnels if not designed or implements properly can have security and performance issues.

NAT Policies:

Policies allowing private IP addresses within the network, to communicate with the internet using intermediate public IP. NAT offers security through address conservation and an important element of remote access.

App Rules:

Rules which define traffic for various applications. Granular application level access control provides ability to enforce corporate policies at the same time ubiquitous use of applications by the employees.

Access Rules:

Rules which identifies sources within the network which can be accessed from the internet. Access rules defines and controls permissions for sources and addresses which are permitted to communicate with public internet)

Avoid Breaches

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Achieve Compliance

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Improve Security

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Remediation:

Quote to implement To-Be state of the Firewall

FIREWALLS CAN’T MANGE ITSELF. OUR FIREWALL ADUIT HELPS YOU MANGE IT BETTER. FIREWALL NEEDS CONTINOIUS UPDATES AND MAINTENANCE BASED ON CHANGING SECURITY REQUIREMENTS.

Reports:

Firewall “AS-IS TO-BE” analysis report

Penetration Testing is a Multi – Layered security assessment that uses a combination of machine and human-led techniques to identify and exploit vulnerabilities in Infrastructure, system and applications.

TO AVOID LOSS OF REPUTATION AND TRUST. ALL PUBLIC FACING IT ASSEST SHOULD BE TESTED ON REGULAR INTERVALS FOR VULNERABILITIES AND SECURITY SHOULD BE HARDENED.

Penetration Testing is a Multi – Layered security assessment that uses a combination of machine and human-led techniques to identify and exploit vulnerabilities in Infrastructure, system and applications.

Web Application:
Apps access via web

Web application penetration testing is the process of proactively identifying applications for vulnerabilities, such as those that could lead to the loss of sensitive user and financial information.

Mobile Application:
Apps access via Mobile

It's the process to identify security vulnerabilities in an application by evaluating the system or network with various malicious techniques. The weak points of a system are exploited in this process through an authorized simulated attack.

Public Facing IP:
IP open to public internet

User Access:

Authorised access control, role definition, authentication process, backdoor within the code. Session management, privilege configurations, local and remote access policies.

Web:

Website and web portals are important aspects of any business. Security breaches leads to loss of reputation and trust with the customers, partners and employees. Organisations cannot afford to have websites and intranet sites compromised as the associated cost would be significant.

Database:

Security configuration, access and privilege configuration, security architecture, local and remote access policies, error handling and logging, HTTP security and input validation, Cryptography

Application:

Application security testing for web, desktop, mobile and IoT applications. Tested against corporate policy for assess and dissemination of information through the application.

Avoid Breaches

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Achieve Compliance

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Improve Security

Lorem ipsum dolor sit amet, consectetuer adipiscing elit, sed diam nonummy nibh eu

Remediation:

Remediation roadmap with fixed price quotes

TO AVOID LOSS OF REPUTATION AND TRUST. ALL PUBLIC FACING IT ASSEST SHOULD BE TESTED ON REGULAR INTERVALS FOR VULNERABILITIES AND SECURITY SHOULD BE HARDENED.

Reports:

Pass / Fail report

360 Audit
360 Audit
To gain an insight into your organisations required security posture vs current security setup. This audit validates security posture for people, process and technology. First step towards a comprehensive cyber security strategy for your business.
This would reduce the risk, legal ramifications and cost of breach.
Firewall Audit
Having a firewall is no guarantee your business is protected. Validating that it is doing the job is what is going to protect your business.
Without regular firewall audits you’ll assume you’re protected however in reality you have got no or restricted protection. Don’t live in ambiguity know the facts for sure.
Firewall Audit
Penetration Testing
Penetration Testing
Having a firewall is no guarantee your business is protected. Validating that it is doing the job is what is going to protect your business. Without regular firewall audits you’ll assume you’re protected however in reality you have got no or restricted protection. Don’t live in ambiguity know the facts for sure.

Our Partners