Cybersecurity vision
We believe in minimizing business disruption by preventing security risks from entering production environments. Our focus is on a proactive security approach rather than a reactive one.
By identifying and addressing security issues swiftly and efficiently, using automated processes and advanced technical expertise, we aim to reduce production risks.
We understand compliance as a consequence of a robust security practice.
our cybersecurity servicesCybersecurity services
Security posture
Focused on DevSecOps practices to automate the identification, risk evaluation, remediation and process follow up based on an ASPM tool to get an unified view of the application and release security posture. This for in-house developing and/or 3rd party software providers security requirements.
Implementation strategy
Focused on the production environment infrastructure and applications to automate the identification, risk evaluation, remediation and process follow up based on an ASPM tool to get an unified view of the application and release security posture.
Incident response
Having a hard technical skilled team to analyze the production stack (application and infrastructure) to identify the flaw, contain the damage, get a root cause analysis and implement actions to prevent new incidents.
Security posture
Application Security
- Threat Modeling
- Static Application Security Testing (SAST, MobSF)
- Supply chain security (SCA and SBOM)
- Secret scan
- IaC recipes scan
- Container Registry Security (Quay)
QA Security
OWASP ZAP to build an automated security testing library
Infrastructure Security Posture
Focused on DevSecOps and Infrastructure security practices to ensure the release process of the software component. Check and monitor the container registry (ex: Quay) and the related infrastructure security configuration and release policies.
Security Posture Management Tool
Centralized tool for al the previous stages scans results to build an unified view of the risk status, automated triage for risk evaluation, follow up the resolution process and company’s tools integrations (ex: Jira)
Implementation strategy
To build a realistic, company aligned and technically aligned implementation of the security posture be start by doing an assessment and defining and implementation strategy and roadmap. On this assessment, we identify business needs, goals and compliance security requirements to understand the main security risks and assets.
Based on the business alignment process, the risk appetite, the security goals, security guidelines (OWASP, SAMM, NIST, etc) support the company’s security team to define a strategy and set a technical action plan/roadmap to achieve the security goals in a business compatible way.
Incident response team
Incident Prevention
Support in defining incident response procedures and incident management training (for C-levels, managers, etc.) focusing on the decision-making processes during an incident. For the technical team, workshops conducting attack scenario simulations to practice forensic techniques. Also, perform general attack scenarios (ex: phishing) to help measure the awareness program effectivity.
Incident Response
On an incident, provide a high technical qualified team to perform tasks like:
- incident containment and initial analysis to find the main indicators of compromise (IoC), define an initial impact and potential lateral movements.
- Perform a full root cause analysis to have a deep understanding on why the incident happened, including technical and process evaluation.
- Report and evidence collection required by insurance companies.
- Lesson learned and recommendations to prevent similar incidents to happen again.
