Today we will thresh how to perform one of the star services we offer that, in turn, is much needed for owners and operators of control systems. Discover what tasks are performed in a network auditing!

Activities that make up our network audit service

Everything you do when you hire our service is!

Review the technical documentation

We begin, of course, to be seen whether these documents are being properly performed. They serve us, throughout the process, according to customer needsSuggest improvements to processes.

Some of the files will be reviewing architecture diagrams and process documents procedures, the asset inventories ...

Review Settings and functionality

This evaluated by validations, system control. We seek an understanding of the unique requirements that has the control system being analyzed and their characteristics. In addition, able to identify which areas on which to focus our actions, following the discovery of some vulnerabilities it is.

The result is the improved security without having to make the system in question to stop working.

The importance of a network security audit

analyze risks

important task in network auditing It is risk analysis, as this is the only way we can understand how vulnerable the system and thereby work this essential aspect.

What we want is to know the protection status of each asset measurably, ie, at what level.

This can be done autonomously, without considering a full audit although it is most inconvenient, since it is still only part of the process used in certain cases but whose results could even be counterproductive.

Laboratory work

We lock on a control system disconnected producer, looking wherever it close as possible this so that the data are inconclusive.

You can not work on the risks but vulnerabilities are identified and is taking steps to soften the situation.

Our analysis is active and intrusive devices and passes through port scans, vulnerability and others.

Work on the production system

In this case, we work on actual production system up and runningSo that all information received is a reflection of the work of this.

Tipos y propósitos de la auditoría de redes de comunicación

end end penetration

We aim to know how destructive or deep it could be an attack. You can make penetration from outside or from inside, always convenience.

Components work

This time we focus on product safety, testing them in isolation, but are connected to the system.

Interviewing staff

Indeed, not only we are dedicated to the machines and connections, the workforce is really important and interviews got a lot of information that otherwise could not meet up to the point of being another tasks to be performed in a network auditingAs important as the others.

Thus, among other things, we discover if they make good use of the resources at its disposal and even if they can be themselves a breach in the security of the system, something on the other hand, very common. We also used to know, first hand, how it works and how the system works.