SAFETAG
Custom guide creator
Security Auditing Framework and Evaluation Template for Advocacy Groups. SAFETAG is a professional audit framework that adapts traditional penetration testing and risk assessment methodologies to be relevant to smaller non-profit organizations based or operating in the developing world.
Learn MoreMethods
Explore all Safetag Methods
Preparation
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
التحضير
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
Preparación
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
Preparation
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
Preparation
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
ကြိုတင်ပြင်ဆင်ခြင်း
ဤအစိတ်အပိုင်းတွင် စစ်ဆေးမှုပြုလုပ်ရန် ပြင်ဆင်ခြင်းကိစ္စများ ပါဝင်ပြီး စစ်ဆေးမှု အစိတ်အပိုင်းများကို လုပ်ငန်းခွင်၌ သတ်မှတ်ချိန်အတွင်း ထိရောက်စွာ ဆောင်ရွက်နိုင်ကြောင်း သေချာစေရန် ထိုပြင်ဆင်မှုများကို လိုအပ်ပါသည်။ ...
Preparation
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
Подготовка
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
Preparation
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
Preparation
This component consists of audit preparation activities that are needed to ensure the components of the audit are able to be conducted effectively and within the on-site...
Context Research
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Capacity Assessment
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Reconnaissance
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
အဖွဲ့အစည်းဆိုင်ရာမူဝါဒ ပြန်လည်သုံးသပ်ချက်
ဤနည်းစနစ်သည် လက်ရှိအဖွဲ့အစည်းဆိုင်ရာ အလေ့အကျင့်များ၊ အလွတ်သဘော သဘောတူညီချက်များ၊ သတင်းအချက်အလက်လုံခြုံရေးကို စီမံခန့်ခွဲခြင်းနှင့် ခြိမ်းခြောက်မှုများကို တုံ့ပြန်ခြင်းဆိုင်ရာ မူဝါဒများကို စူးစမ်းလေ့လာသည်။ ၎င်းသည် အဖွဲ့အစည်းတွင်း မူဝါဒများတွင် မျှဝေခြင်းမပြုသော (အလွတ်သဘော သို့မဟုတ် မရှိ) သို့မဟုတ် စနစ်တကျပြင်ဆင်မထားသော ယူဆချက်များကို ဖော်ထုတ်ရန်လည်း ကြိုးပမ်းသည်။ ...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Organizational Policy Review
This methodology explores existing organizational practices, informal agreements, and policies around managing information security and responding to threats. It also seeks to reveal presumptions made within the...
Network Mapping
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Organizational Device Usage
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
استخدام المنظمة للأجهزة
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Uso Organizacional de Dispositivos
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Organizational Device Usage
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Organizational Device Usage
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Organizational Device Usage
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Organizational Device Usage
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Использование устройств организацией
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Organizational Device Usage
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
Organizational Device Usage
This component allows the auditor to discover and assess the security of the devices on the network and/or used in the organization. This component consists of interviews,...
User Device Assessment
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
تقييم أجهزة المستخدمين
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
Evaluación de Dispositivos de Usuario
Este componente permite que el auditor evalúe la seguridad de dispositivos individuales en la red. Consiste de entrevistas, encuestas e inspecciones de los dispositivos. ...
User Device Assessment
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
User Device Assessment
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
User Device Assessment
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
User Device Assessment
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
Анализ устройств пользователей
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
User Device Assessment
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
User Device Assessment
This component allows the auditor to assess the security of the individual devices on the network. This component consists of interviews, surveys, and inspection of devices. ...
Vulnerability Scanning and Analysis
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Data Assessment
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Seguridad Física y Operacional
La metodología de seguridad organizacional está enfocada en cómo mitigar las amenazas que ocurren debido a la disposición de recursos digitales en el mundo físico...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Physical and Operational Security
The organizational security methodology is focused on how to mitigate against threats that occur because of the arrangement of digital assets in the physical world -- how...
Process Mapping and Risk Modeling
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
Responding to Advanced Threats
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Threat Assessment
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
Responsive Support
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
الدعم الاستجابي
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Responsive Support
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Soporte Reactivo
El auditor provee asistencia para cualquier acción inmediata necesitada (entrenamiento puntual, arreglo de herramientas, consultoría en proyectos venideros) -- esto también puede involucrar el tratamiento...
Responsive Support
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Responsive Support
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Responsive Support
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Оперативная поддержка
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Responsive Support
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Responsive Support
The auditor provides assistance for any immediate action needed (spot training, tool fixes, consulting on upcoming projects) -- this may also involve addressing vulnerabilities that triggered an...
Debrief
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
استخلاص
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Reporte
Este componente consiste de un breve resumen de los puntos clave de contacto, proveyendo un alivio de las presiones básicas a través de interacciones grupales...
Debrief
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Debrief
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Debrief
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Debrief
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Подведение итогов
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Debrief
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Debrief
This component consists of an out-brief to key points of contact, providing basic pressure relief through group and individual interactions, and planning future follow-up with the host...
Follow Up
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
تقييم القدرة
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
الإستجابة للتهديدات المتقدمة
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
البحث السياقي
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
تقييم البيانات
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
المتابعة
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
تخطيط الشبكة
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
الاستطلاع
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
تخطيط العمليات ونمذجة المخاطر
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
تقييم التهديد
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
فحص وتحليل الثغرات
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Respondiendo a Amenazas Avanzadas
Este componente le permite al auditor ser capaz de identificar, analizar y priorizar en gravedad los comportamientos sospechosos en un dispositivo o red. Dependiendo del...
Evaluación de Capacidad
En este componente, el auditor interactúa con el personal a través de entrevistas y conversaciones para identificar las fortalezas y debilidades de la organización (pericia,...
Investigación Contextual
Este componente le permite al auditor identificar el contexto regional y tecnológico relevante necesario para proveer una auditoría SAFETAG segura e informada. Éste consiste de...
Evaluación de Datos
Este componente le permite al auditor identificar qué datos delicados existen para la organización, dónde están almacenados y cómo son transferidos. ...
Seguimiento
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Mapeo de Red
Este componente le permite al auditor identificar problemas de seguridad con la red del anfitrión y mapear los dispositivos en la misma, los servicios que...
Mapeo de Procesos y Modelado de Riesgo
Este componente le permite al auditor conducir al personal de la organización anfitriona en una serie de actividades para identificar y priorizar los procesos que...
Evaluación de Amenazas
Este objetivo usa una variedad de actividades para para identificar posibles atacantes y recopila información de trasfondo acerca de la capacidad de esos atacantes de...
Escaneo y Análisis de Vulnerabilidad
Este componente hace que el auditor descubra posibles imperfecciones en los dispositivos, servicios, diseño de aplicaciones y redes de la organización, al probar y compararlos...
Responding to Advanced Threats
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Capacity Assessment
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Context Research
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Data Assessment
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Follow Up
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Analyse de réseau
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
Reconnaissance
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
Process Mapping and Risk Modeling
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
Threat Assessment
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
Vulnerability Scanning and Analysis
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Reconocimiento
La metodología de evaluación remota se enfoca en la observación directa de una organización y su infraestructura, consistiendo en el reconocimiento pasivo de fuentes de...
Report Creation and Recommendation Development
En este componente, el auditor identifica las fortalezas y debilidades de la organización (pericia, finanzas, voluntad de aprender, horas de dedicación del personal, etc.) para...
Responding to Advanced Threats
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Capacity Assessment
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Context Research
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Data Assessment
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Follow Up
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Network Mapping
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
Reconnaissance
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
Process Mapping and Risk Modeling
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
Threat Assessment
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
Vulnerability Scanning and Analysis
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Responding to Advanced Threats
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Capacity Assessment
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Context Research
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Data Assessment
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Follow Up
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
ကွန်ရက်မြေပုံဆွဲခြင်း
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
ထောက်လှမ်းခြင်း
အဝေးမှ အကဲဖြတ်နည်းစနစ်သည် အများသူငါ ရရှိနိုင်သော ဒေတာရင်းမြစ်များ ("လွတ်လပ်စွာ ရယူနိုင်သောအချက်အလက်များ") အား စနစ်မဲ့ကင်းထောက်ခ ြင်း ပါဝင်ပြီး အဖွဲ့အစည်းနှင့် ၎င်းတို့၏ အခြေခံအဆောက်အအုံများကို တိုက်ရိုက်စောင့်ကြည့်ခြင်းအပေါ် အလေးပေးသည်။ ဤသို့ လုပ်ဆောင်ခြင်းသည် စစ်ဆေးသူအား အဖွဲ့အစည်းနှင့်ချိတ်ဆက်ထားသည့် အများသူငါ ရရှိနိုင်သော အရင်းအမြစ်များ (ဥပမာ ဝက်ဘ်ဆိုဒ်များ၊ extranets၊...
Process Mapping and Risk Modeling
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
ခြိမ်းခြောက်မှု အကဲဖြတ်ခြင်း
ဤရည်ရွယ်ချက်အရ ဖြစ်နိုင်ခြေရှိသော တိုက်ခိုက်သူများကို ရှာဖွေဖော်ထုတ်ရန်နှင့် ထိုတိုက်ခိုက်သူများ၏ အဖွဲ့အစည်းအပေါ် ခြိမ်းခြောက်နိုင်စွမ်းနှင့်ပတ်သက်သည့် နောက်ခံအခ ျက်အလက်များ စုဆောင်းရန် လုပ်ဆောင်ချက်အမျိုးမျိုးကို အသုံးပြုသည်။ ဤနေရာတွင် တိုက်ခိုက်သူတစ်ဦး၏ ခြိမ်းခြောက်မှုများကို အကောင်အထည်ဖော်ခဲ့သည့် မှတ်တမ်းအား ရှာဖွေဖော်ထုတ်ခြင်း၊ အဆိုပါ ခြိမ်းခြောက်မှုများကို လက်ရှိတွင် အကောင်အထည်ဖော်နိုင်စွမ်းနှင့် အရင်းအမြစ်များကို အသုံးချ၍ ပစ်မှတ်အား ခြိမ်းခြောက်ရန်...
Vulnerability Scanning and Analysis
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Responding to Advanced Threats
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Capacity Assessment
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Context Research
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Data Assessment
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Follow Up
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Network Mapping
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
Reconnaissance
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
Process Mapping and Risk Modeling
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
Threat Assessment
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
Vulnerability Scanning and Analysis
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Другие угрозы
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Оценка ресурсов
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Изучение контекста
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Оценка данных
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Последующая работа
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Создание карты сети организации
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
Рекогносцировка
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
Создание карты процессов и моделирование рисков
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
Оценка угроз
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
Определение и анализ уязвимостей
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Responding to Advanced Threats
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Capacity Assessment
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Context Research
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Data Assessment
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Follow Up
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Network Mapping
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
Reconnaissance
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
Process Mapping and Risk Modeling
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
Threat Assessment
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
Vulnerability Scanning and Analysis
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...
Responding to Advanced Threats
This component allows the auditor to be able to identify, triage, and analyze suspicious behavior on a device or in a network. Depending on the analysis, the...
Capacity Assessment
In this component the auditor engages with staff through both formal interviews and informal conversations to identify the organization's strengths and weakness (expertise, finance, willingness to learn,...
Context Research
This component allows the auditor to identify the relevant regional and technological context needed to provide a safe and informed SAFETAG audit. This component consists of desk...
Data Assessment
This component allows the auditor to identify what sensitive data exists for the organization, where it is stored, and how it is transferred. ...
Follow Up
This component allows an auditor to explain and get feedback on their report as well as evaluate the success of the process over time through a...
Network Mapping
This component allows the auditor to identify security issues with the host's network and map the devices on a host's network, the services that are...
Report Creation and Recommendation Development
In this component the auditor identifies the organization's strengths and weakness (expertise, finance, willingness to learn, staff time, etc.) to adopting new digital and physical...
Reconnaissance
The remote assessment methodology focuses on direct observation of an organization and their infrastructure, consisting of passive reconnaissance of publicly available data sources ("Open Source Intelligence") This...
Process Mapping and Risk Modeling
This component allows an auditor to lead the host organization's staff in a series of activities to identify and prioritize the processes that are critical for the...
Threat Assessment
This objective uses a variety of activities to identify possible attackers and gather background information about the capability of those attackers to threaten the...
Vulnerability Scanning and Analysis
This component has the auditor discover possible flaws the organization's devices, services, application designs, and networks by testing and comparing them against a variety of online and...