Zero Tust Readiness Check
Assessment of whether Zero Trust controls align with compliance requirements such as NIS2, ISO and BIO.
Zero Trust Policy Enforcement Automation
Implementation of policy enforcement automation scripts.
Priviliged Access Management Design
Blueprint for admin account management and security through CyberArk/Azure PIM.
Privileged Access Risk Assessment.
Understanding privileged account management and risk in Azure/AWS.
Third Party Risk Assessment
Analysis of risks by suppliers and external partners. Check of contractual agreements and technical access security.
Security Policy Alignment Check
Review of current security policies and adjustments for Zero Trust alignment.
Zero Trust Attack Surface Assessment
Analysis of external and interen attach surface. Indentification of unnecessary inputs and overprivileged accounts.
Technical Security Consultant
Identify vulnerabilities and implement security solutions. Translating security principles into practical measures and tooling.