Overview
Approach: ⁃ Review current Security and Event Management requirements, processes and tooling. ⁃ Identify key challenges and provide actionable recommendations ⁃ Assess alignment to NCSC’s cloud security principles. ⁃ Analysis delivered via a mix of workshops, offline artefacts analysis and targeted 1-2-1 discussions
Assessment Report ⁃ IDAM process review, including user lifecycle management and authorising user access recommendations ⁃ Review event logging approach and identify opportunities for automation, event correlation and fine tuning ⁃ Assessment against various security standards including Cyber Essentials Plus, DSP Toolkit ,ISO27001 and SOC2 ⁃ Security Posture monitoring assessment, including security controls, attack vectors and mapping the attack surface.
Sold by | Kainos |
Categories | |
Fulfillment method | Professional Services |
Pricing Information
This service is priced based on the scope of your request. Please contact seller for pricing details.