4
Vulnerability Assessment within your IT network Transparency about potential attacker’s entry points Risk posture: identification of exploiting vulnerabilities Red/Blue Team exercise to test detection capabilities We support you to gain assurance in your organisation’s vulnerability assessment and management processes through a realistic simulation of a hacker attack Benefits Security level of the investigated systems is measurable Fulfilling of compliance requirements (e.g. national regulations, GDPR, TISAX) Recommandations regarding the improvements to be made to your information security guidelines IT Penetration Test

IT Penetration Test - Airbus CyberSecurity

  • Upload
    others

  • View
    11

  • Download
    0

Embed Size (px)

Citation preview

Transparency about potential attacker’s entry points
Risk posture: identification of exploiting vulnerabilities
Red/Blue Team exercise to test detection capabilities
We support you to gain assurance in your organisation’s vulnerability assessment and management processes through a realistic simulation of a hacker attack
Benefits
Fulfilling of compliance requirements (e.g. national regulations, GDPR, TISAX)
Recommandations regarding the improvements to be made to your information security guidelines
IT Penetration Test
IT Penetration Test can cover from end user endpoint to on-premise/ cloud infrastructure
Why do you need Penetration Tests
«Cyber Incidents» represent one of the world’s greatest business risks and are not considered as theoretical threats. In the IT Penetration Test we offer, a realistic simulation of a «hacker attack» can be carried out.
Risk analysis of cyber-attacks are often only carried out on the basis of theoretical assessments. The implementation of a Penetration Test is an ideal supplement to enable a real measurement of the resistance capability of the IT environment. Once the vulnerability is confirmed and based on these findings, a realistic risk assessment will be made.
We offer advanced Know-How within different environments:
IT OT Platform Security
*in addition to the Penetration Test
Purple Team is the result of the collaboration between the Blue Team and the Red Team and simulate Advanced Persistent Threats (APT).
We offer the following IT Penetration Tests
We also offer Social Engineering Penetration Tests by taking on the role of cyber attackers and test your IT security culture. Our planned and targeted attacks test the information security behaviour of your employees and expose the methods of cyber criminals before they can attack.
BLACK BOX
GREY BOX
WHITE BOX
Auditors will not be given any knowledge about the audited asset or group of assets We simulate a malicious third-party
Auditors will be given the knowledge of a legitimate user (e.g. valid credentials) We simulate a malicious user or a third-party that could get this information through a first successful attack
Fully assess the risks of escalation and propagation, the auditors will be given all the knowledge they need (e.g. source codes and configurations)
We simulate a malicious third-party or user that has already compromised part of the entire asset or group of assets
Our approach
FRANCE Metapole 1, boulevard Jean Moulin CS 40001 / 78996 Elancourt Cedex France
UNITED KINGDOM Quadrant House / Celtic Springs Coedkernew / South Wales NP10 8FZ / United Kingdom
GERMANY Willy-Messerschmitt-Str. 1 82024 Taufkirchen Germany
This document is not contractual. Subject to change without notice. © 2021 Airbus CyberSecurity. AIRBUS, its logo and the product names are registered trademarks. All rights reserved.
[email protected] www.airbus-cyber-security.com
Airbus CyberSecurity is proud to have its own international Team called «Defence Offence Team» for «Capture-The-Flag» challenges. These are defence-oriented challenges with network exploration, forensic, system hardening, security tool integration, reverse, pentest and development exercises.
Experience in protecting critical infrastructure
All auditors have several years of experience in Penetration Testing
International team based in Germany, France, the United Kingdom and Spain
Information Systems Security Auditor Provider (PASSI) Qualification in France
Successful Capture-The-Flag Team (Defence Offence Team), taking part in well-known competitions and constantly facing new challenges:
PASSI PDIS
Process of our IT Penetration Tests Within the scope of a Managed Penetration Test, we also take over the planning and coordination of all Penetration Tests that are pending in your company.
Kick-off
Analysis & Report
Scope Qualification
Selection of all assets which are in scope for the Penetration Test
Meeting with all involved Stakeholders, introduction into (scoped) assets
Penetration Test against (scoped) assets based on standardised methodology
Delivery of Penetration Test Report with recommandations
* On Demand