Data Egress Risk Assessment
RISK ASSESSMENT
Do you know where your data is going?
Audit your egress data to discover exposures to potential data theft.
Why this matters!
The first step to eradicating data theft is understanding where your data should NOT be going to. This includes application data both from users and from servers.
Our pen test style audit identifies all applications found to be transmitting data, where it is going, and what are the potential risks for data theft:
– theft via non-approved applications (eg personal cloud storage)
– egress traffic at risk from spoofing attacks
– egress traffic at risk from poisoning attacks
– egress traffic at risk of transmission out-of-country
– data at risk from insider attack
– data at risk from hacker attack
– data compromised by malware (bots, ransomware, spyware, etc)
Our discovery audit can include user devices as well as servers, to assess:
+ Is sensitive application data GOING DIRECTLY to the vendor?
+ Are update requests GOING DIRECTLY to the vendor?
+ Discover NON-BUSINESS applications transmitting data
+ Discover UNKNOWN/COVERT applications transmitting data
COMPLIANCE ASSESSMENT
Prove where your data is going!
For ISO27001 / ISO27701
ISO27001: Information Security and ISO27701: Privacy Management both mandate controls for data transfer, data protection, and third party data sharing.
Our compliance audit provides you with evidence to demonstrate to your ISO assessor that you monitor egress data from user devices and servers, and that you know where it is going to.
Our compliance audit can include user devices as well as servers, including:
+ MICROSOFT applications’ egress data
+ MICROSOFT applications update requests
+ THIRD PARTY applications’ egress data
+ THIRD PARTY applications update requests
+ ROGUE/COVERT application discovery
Why ZORB?
This means we provide much more detailed observations about where data is to, and where it should be going.
APPLICATION LAYER
This means we identify future potential for internal theft, as well as potential exposure to external actors.
POTENTIAL THEFT
This means we can detect theft already in progress by hackers, insiders or malware.
ONGOING THEFT