{"id":898,"date":"2024-04-11T06:51:28","date_gmt":"2024-04-11T06:51:28","guid":{"rendered":"https:\/\/qtnt.com\/?page_id=898"},"modified":"2024-04-16T11:09:27","modified_gmt":"2024-04-16T11:09:27","slug":"infrastructure-security-assessment","status":"publish","type":"page","link":"https:\/\/qtnt.com\/index.php\/infrastructure-security-assessment\/","title":{"rendered":"Infrastructure Security Assessment"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" class=\"wp-block-cover__image-background wp-image-1051\" alt=\"\" src=\"https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-brett-sayles-4339335-1024x683.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-brett-sayles-4339335-1024x683.jpg 1024w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-brett-sayles-4339335-300x200.jpg 300w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-brett-sayles-4339335-768x512.jpg 768w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-brett-sayles-4339335-1536x1024.jpg 1536w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-brett-sayles-4339335-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<p>The control objective is to ascertain whether adequate technical security controls have been implemented to secure the infrastructure, platforms hosting the critical Business application systems for the organisation. The Assessment approach adopted starts with reviewing the network diagram\/ topology\/ network traffic profile and understand security devices deployed to protect organisations information assets.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assess network topology and protocols<\/li>\n\n\n\n<li>Assess the network &#8211; security devices like Firewall, Web Application firewall, UTM etc<\/li>\n\n\n\n<li>Assess the network traffic profile<\/li>\n\n\n\n<li>Carry out vulnerability scans and penetration test exercises<\/li>\n\n\n\n<li>Evaluate blue team capability<\/li>\n\n\n\n<li>Provide GAPs identified, and remediation advisory with implementation roadmap &amp; prioritisation<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The control objective is to ascertain whether adequate technical security controls have been implemented to secure the infrastructure, platforms hosting the critical Business application systems for the organisation. The Assessment approach adopted starts with reviewing the network diagram\/ topology\/ network traffic profile and understand security devices deployed to protect organisations information assets.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-898","page","type-page","status-publish","hentry"],"blocksy_meta":[],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":""},"post_excerpt_stackable":"<p>The control objective is to ascertain whether adequate technical security controls have been implemented to secure the infrastructure, platforms hosting the critical Business application systems for the organisation. The Assessment approach adopted starts with reviewing the network diagram\/ topology\/ network traffic profile and understand security devices deployed to protect organisations information assets. Assess network topology and protocols Assess the network &#8211; security devices like Firewall, Web Application firewall, UTM etc Assess the network traffic profile Carry out vulnerability scans and penetration test exercises Evaluate blue team capability Provide GAPs identified, and remediation advisory with implementation roadmap &amp; prioritisation<\/p>\n","category_list":"","author_info":{"name":"admin","url":"https:\/\/qtnt.com\/index.php\/author\/venkat\/"},"comments_num":"0 comments","_links":{"self":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages\/898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/comments?post=898"}],"version-history":[{"count":3,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages\/898\/revisions"}],"predecessor-version":[{"id":1052,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages\/898\/revisions\/1052"}],"wp:attachment":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/media?parent=898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}