https://store-images.s-microsoft.com/image/apps.33525.9b98d40c-afa4-41ef-8533-de3fb192f0d6.fbe5ee98-7a8b-4724-832c-9a5a7d17a8fa.1ea2d70a-300a-43f4-a8ee-2aeb0cbe7baf

Cyber Security Assessment

ELEVATE Solutions Limited

The Cybersecurity Assessment helps customers assess their security posture and risk to insider threats.

The engagement covers two commonly seen threat scenarios: Human-operated Ransomware Data Security risks from company insiders Using the engagement tools, discover vulnerabilities within the customerā€™s production environment across cloud, servers and endpoints. The vulnerabilities and risks are analyzed and prioritized to show how prepared the customerā€™s defenses are against the included threat scenarios. Prepare detailed recommendations from the assessment to help the customer prioritize the improvements to their cybersecurity posture.

What weā€™ll do during the engagement?

  1. Analyze the customerā€™s environment and current cybersecurity maturity level based on v8 of the CIS Critical Security Controls.
  2. Define scope & deploy Microsoft Defender Vulnerability Management and Insider Risk Analytics in the customerā€™s production environment.
  3. Perform a vulnerability assessment and assist with the prioritization of vulnerabilities and misconfigurations across the customerā€™s organization.
  4. Perform a data security assessment, discover and evaluate sensitive information and potential insider risks in the customerā€™s organization.
  5. Plan next steps on how to improve the customerā€™s cyber and data security posture and how you can work together for future engagements.

Objectives and Approach

  1. Discover vulnerabilities: Gain visibility into vulnerabilities to the customerā€™s Microsoft 365 cloud using Microsoft Secure Score. Discover and analyze vulnerabilities to servers and endpoints using Microsoft Defender Vulnerability Management.
  2. Explore and Evaluate sensitive information and potential insider risk Gain visibility into sensitive information discovered by Microsoft Purview Information Protection. Explore potentially risky data handling activities identified by Microsoft Purview Insider Risk Management Analytics.
  3. Define next steps As part of the engagement, work together with the customer to define a list of next steps based on their needs, objectives, and results from the Cybersecurity Assessment.

At a glance

https://store-images.s-microsoft.com/image/apps.45074.9b98d40c-afa4-41ef-8533-de3fb192f0d6.fbe5ee98-7a8b-4724-832c-9a5a7d17a8fa.515cff45-1a50-4cb6-a902-2e7af470cfd6