HomeSecurity SolutionsCyber Vulnerability Assessments
Share:Share on FacebookShare on Google+Tweet about this on TwitterShare on LinkedIn

Attacks on industrial control systems (ICS) represent the greatest economic risks to the energy industry and a compromise of these critical systems can have serious consequences and economic impact. Cyber vulnerability assessments (CVA) can help identify, quantify and mitigate the vulnerabilities discovered in these critical control systems and also meet NERC CIP compliance requirements.

CYBER VULNERABILITY ASSESSMENTS CAN HELP

Every organization deals with sensitive information whether it be proprietary data, operational settings or personal identity data of customers and employees. To proactively identify, quantify and prioritize vulnerabilities in a system, a rigorous cyber vulnerability assessment should be performed periodically. At FoxGuard, we provide two types of vulnerability assessments:

  • Passive Vulnerability Assessment, also known as “paper” assessments, this non-invasive analysis takes advantage of an operating system’s native tools to gather system information which would then be compared to an established baseline.
  • Active Vulnerability Assessments use third party tools coupled with our industry specific expertise to actively assess the environment, carefully discovering possible vulnerabilities using the existing communications networks.

MEETING COMPLIANCE REQUIREMENTS

FoxGuard CVA are specifically crafted for compliance audit evidence. Designed to meet the NERC CIP requirements, the CVA reports include documentation of results and recommendations for mitigation of any issues discovered. The reports are easy to read and include a pre-built action item table.

HOW FOXGUARD HELPS YOU BECOME SECURE

  • Provide scanning options that best suit the needs and environments of our clients
  • Industry professionals provide the tools and expertise to properly assess and evaluate your environment
  • Consulting services provide mitigation suggestions for areas of concern and any vulnerabilities discovered
  • Discovery of all access points to your electronic security perimeter (ESP)
  • Work with the client to verify enabled ports and services at each access point
  • Verify that only logical ports and services required for operations are enabled on each system
  • Review controls for default accounts, passwords, and network management community strings for each cyber system under review
  • Comparison of documented baseline configurations against discovered system information