Because of the “General Data Protection Regulation” (GDPR) organizations need to take (security) precautions. An audit can provide clarity as to whether your current work method fully meets the parameters of the privacy regulations. We can support you with a Security Audit. The legal aspects will be checked by our partner ICTRecht during a Privacy Audit.
Comply with privacy regulations
With our security audit we can determine which security measures are relevant to your organization and to which degree they have already been applied. The pentest will verify the effectiveness of these measures. ICTRecht will complement the audit with a Privacy Audit to determine whether the security measures are legally sufficient.
IT Security assessment
To gain more insight in the risks of IT Security, we will identify (internal and external) network connections, unknown and outdated software and current IT policies and procedures (including password policy, authorization control and data storage). We will also check for modern internet standards that contribute to the accessibility and security of software.
We perform automated web application and network scans to locate vulnerabilities in your web application. We will also perform an extensive manual test for all aspects that are known to be abused by hackers to gain unauthorized access. At least all vulnerabilities listed in the OWASP-Top 10 will be tested, but we will also look at several specific and general vulnerabilities.
Our work method
In collaboration with our partner ICTRecht we can check the privacy and technical aspects of a data processing agreement, for which ICTRecht will perform the legal check.
One of our Security Analysts will perform an IT Security assessment on site. This way we get a clear insight into the IT Security risks within your company. This assessment will take 3 to 5 days.
For our pentest, we will check your web application (from the outside) for any design, configuration and programming errors. The duration of the pentest is 5 to 7 days, depending on the size and complexity of your IT environment.
IT Security assessment3 - 5 days
- Execution by Security Analyst on site
- Assessment network connections (internal and external)
- Identification unknown and outdated software
- Assessment IT policies and procedures
- Check modern internet standards
Pentest5 - 7 days
- Automated web application and network scans
- Extensive manual test
- Execution remote, on site if necessary
- Interim rescan(s) after fixing found vulnerabilities
- Report with findings and recommendations
Curious about our services?
Would you like more information about our Security Audit or any of our other services? Fill out your details and we will contact you within 24 hours on business days.