dcl - 19-003 info sheets - security - vuln - ass...digital craftsmen limited | 102 coppergate house,...

2
Cloud Control Security & Vulnerabilities Assessment Are you taking action? It’s not a question of if, but when your IT infrastructure will be compromised. And without regular maintenance and hardening of infrastructure against weak system design and software vulnerabilities, it will become an absolute certainty your IT will be compromised in the future. Protect your cloud application with Digital Craftsmen 1 Provide your signed consent form, and a list of assets you want us to review. 2 Digital Craftsmen will analyse the results of the review and categorise the threats you may face by severity level. 3 Work together with our experts to take immediate action to secure your infrastructure.

Upload: others

Post on 15-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DCL - 19-003 info sheets - Security - Vuln - Ass...Digital Craftsmen Limited | 102 Coppergate House, 10 Whites Row, London E1 7NF contactacraftsman@digitalcraftsmen.com | @DCHQ | 020

Cloud Control Security & VulnerabilitiesAssessment

Are you taking action?

It’s not a question of if, but when your IT infrastructure will be compromised. And without regular maintenance and hardening of infrastructure against weak system design and software vulnerabilities, it will become an absolute certainty your IT will be compromised in the future.

Protect your cloud application with Digital Craftsmen 1 Provide your signed consent form, and a list of assets you want us to review.

2 Digital Craftsmen will analyse the results of the review and categorise the threats you may face by severity level.

3 Work together with our experts to take immediate action to secure your infrastructure.

Page 2: DCL - 19-003 info sheets - Security - Vuln - Ass...Digital Craftsmen Limited | 102 Coppergate House, 10 Whites Row, London E1 7NF contactacraftsman@digitalcraftsmen.com | @DCHQ | 020

Digital Craftsmen Limited | 102 Coppergate House, 10 Whites Row, London E1 7NF [email protected] | @DCHQ | 020 3745 7706 | digitalcraftsmen.com

Key security and vulnerability results

1 Software vulnerabilities Faults embedded in the programming of applications can cause unexpected and uncalculated behaviour of the software, expose sensitive information where it should not, or allow an otherwise unprivileged attacker to gain higher levels or access rights.

Vulnerabilities may require immediate patching of your software to a more recent version.

2 Leaked software information Services may inadvertently disclose the type and version of software used to provide and operate the service. Publicly available information about your network, ISP, routing and other network related information may be combined with other available information by attackers to develop an attack plan.

3 Weak security designThis may include easy to guess usernames and passwords (including default usernames and passwords), weak con� guration of � rewalls and access control lists, open ports with unused services installed by default serving them that are not part of your IT application, and other design � aws in your IT application may be revealed.