Absolutely! We’ll be in the same room with you, actively assisting during your CMMC assessment to make sure everything goes smoothly. Our team is right by your side from start to finish.
Meet your CMMC assessment partners.
No system is secure until it is tested for vulnerabilities. And that’s exactly what ProStratus does. Commonly called PEN Testing or Penetration Testing, this approach is an active attempt to breach an organization’s network with the intent to provide feedback on the vulnerabilities that were exploited and to develop a plan of action to “plug the holes.”
Once requested, penetration tests are usually done without warning to give the organization no time to prepare employees. This is the best way to simulate an actual attack and gauge the effectiveness of both users and security controls.
There are different types of tests that represent different methods to compromise your organization.
These testing methods are:
This simulates common attempts to penetrate your organization by getting human beings to give away the “keys to the kingdom.”
This usually includes phishing emails, pretexting (asking seemingly innocuous questions over the phone to gain information to use later) and otherwise manipulating employees into doing something that would compromise business integrity.
These types of penetration attempts test the physical security measures of office buildings or other organizational structures.
A test might include attempting to access secure areas by presenting falsified credentials or by sneaking in through unlocked doors.
Once inside, testers might take notes of passwords written on sticky notes, or place observation devices, such as webcams, to garner further information.
These tests are less technical but are just as important for assessing the security resilience of an organization.
This test targets wireless access to corporate data. The goal is to test configurations and access levels, as well as encryption protocols.
This battery of tests will also attempt to test the mobile devices of users, whether they connect to a secure corporate network or a guest network. This test seeks to reveal weaknesses in wireless structure and configuration by mimicking a threat actor simply being in range of the organizational wireless signal.
Most external attacks focus on web applications, as they are so commonly used by organizations. Whether it be on the server side or the client side, the vulnerabilities of many web applications are known factors and can easily be exploited by threat actors with the right tools.
Web applications offer a great threat to organizations as there are a variety of approaches that can be taken to compromise data. These include, but are not limited to, cross-scripting, poor encryption, and SQL injections.
This is probably the most well-known penetration test, as it is commonly what people assume when they hear the word “hack.”
With a network infrastructure penetration test, there are a variety of approaches. This could include attempts at evading intrusion detection or compromising the anti-virus systems. It could also be initiated from within the network in order to test traffic monitoring protocols or end point protection of workstations.
These types of tests could also focus on network devices, like routers and smart switches, to determine if they are configured correctly or have known vulnerabilities that are exploitable.
Absolutely! We’ll be in the same room with you, actively assisting during your CMMC assessment to make sure everything goes smoothly. Our team is right by your side from start to finish.
Meet your CMMC assessment partners.
Our CMMC Level 2 certification support is hands-on, we guide you through pre-assessment, documentation, and technical requirements so that you’re truly ready for the audit. You’ll have direct access to our expertise every step of the way.
Learn more about ProStratus CMMC Level 2 services.
With 60+ years of combined IT Engineering experience ProStratus will play the key role in designing and implementing your most technically challenging projects
Keeping Appliances, Staff and Clients up to date and aware of the latest trends in threats and protection is part of the ProStratus IT Security umbrella
Matching businesses with the right technology is a ProStratus Key Strength. We're committed to finding the right solutions for your IT goals