The Goal
Identify risks and vulnerabilities to the sensitive internal resources and organizational data assets against those without authorization from an insider perspective.
Our Method
Assess for areas of escalation and bypass through varying levels of provided access, both logical and physical, to identify vulnerabilities and configuration weaknesses in permissions, services, and network configurations.
The Result
Urbane provides assessment reporting that includes:
- Detailed Findings and Observations
- Tailored Remediation Strategies
- Remediation Validation Testing
Testing Scopes
Urbane recommends to focus testing to simulate actual risks and areas of concern to the organization. As such, Urbane focuses their insider threat assessments on the following methods of testing.
Employee Privilege Escalation
Simulating the case of compromised accounts, malicious insiders, and unknowing participants in an attack, Urbane assumes the credentials and roles of varying levels of employee and contractor access to evaluate the provided access, test authentication controls, and assess the risk and impact of a limited-access employee's access to sensitive data, critical assets, and the greater IT infrastructure as a whole.
Vendor Connectivity
As physical and logical connectivity to vendors and third-party contractors is increasingly provided, Urbane assumes the same level of access as provided to the third-party to attempt to bypass security controls with the provided connectivity to simulate a malicious third party or compromised vendor.
Physical Access
Assessing the extent of physical access to an environment with an external device, Urbane provides internal network testing from various testing perspectives to determine the impact of an attacker with physical access to a public or private environment.
Abnormal Activity Detection Evaluation
Testing the effectiveness of abnormal activity detection and incident response, Urbane is provided employee, contractor, or vendor access and performs numerous "suspicious" activities at increasingly noisy levels with the goal being to avoid detection while gaining access to sensitive resources. As attacks become increasingly detectable, Urbane evaluates with incident management teams the effectiveness of their detection methods while providing feedback for increased detection and user adoption.
The Urbane Difference
Innovative. Sophisticated. Refined.
Urbane demonstrates our founding principles in every engagement through attention to the details, modern techniques, and strong union with our clients.
Request more information
Other Urbane Solutions That May Interest You
Social and Physical Testing
The first line of defense in any organization’s security is its end users and, as such, regular awareness campaigns and testing keep users apprised of numerous threats. Additionally, to analyze and prevent physical attacks, Urbane offers physical security reviews including access control reviews, sensitive material management, and human security.
Vendor Management
With many regulatory and compliance requirements mandating supplier due-diligence programs, many organizations do not have the staff or time to allocate to these efforts. Urbane’s knowledge and streamlined vendor assessment framework simplifies the process of annual on-site reviews and supplier due-diligence.
Design and Implementation
From the ground up or integrating into existing infrastructures, Urbane's design and implementation services provide vendor agnostic solutions focusing on greatest security impact within limited resource requirements.
Strategic Advisory (VISO)
With the high demand of qualified security professionals, having a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) on staff can be extremely costly. Urbane’s Virtual Information Security Officer can help an organization leverage top-tier talent from our staff of former Fortune 1000 CSO and CISO’s to assist in managing and architecting security strategies that meet individual client needs.