Network Security
Firewall rules, open ports, segmentation, and access controls
Endpoint Security
Antivirus, EDR deployment, patch compliance, and USB device control
Identity & Access
Password policies, MFA enforcement, admin privilege audits
Cloud Security
M365, Azure, AWS posture, access policies, conditional access, DLP
Data Protection
Encryption policies, backup validation, and retention compliance
Application Security
Web app configurations, API exposure, secure development practices
Vulnerability Scanning
Internal and external scans for OS, software, and network vulnerabilities
Security Awareness
Social engineering readiness, phishing simulation results, training practices
Governance & Compliance
Policies, procedures, incident response plans, and audit readiness