Skip to content

Latest commit

 

History

History
50 lines (35 loc) · 2.74 KB

executive-summary.md

File metadata and controls

50 lines (35 loc) · 2.74 KB

Noble Global Services Logo

Noble Global Services | Executive Summary

1. Internal Assessment Overview

Noble Global Services conducted a comprehensive internal security assessment to identify potential vulnerabilities within the organization’s internal network. Using industry-leading tools like Qualys, we evaluated key areas such as system configurations, firewall settings, and network traffic. The results highlight critical areas needing attention to maintain a secure infrastructure.

2. External Assessment Overview

Our external security assessment, conducted via Tenable, evaluated external threats targeting the organization. The assessment identified areas of potential exposure from outside actors and provided actionable insights to fortify network defenses.

3. Compliance Correlation

The assessment covered the following compliance frameworks, all of which were successfully passed:

  • PCI DSS
  • HIPAA
  • SOC 2
  • ISO/IEC 27001
  • NIST CSF

4. Security Posture Score

The security posture score reflects the overall security health, derived from both internal and external assessments. The score is based on the severity of identified vulnerabilities, with the majority being low severity or information-gathering in nature.

Security Posture Score

Key Vulnerabilities Identified:

  • Information Gathering
  • TCP/IP Configuration
  • Firewall Configurations

5. Summary of Findings

  • Internal Findings (via Qualys): Identified low-risk vulnerabilities related to information gathering and configurations.
  • External Findings (via Tenable): External vulnerabilities were limited, with no high-severity risks.

6. Visual Aids

Security Posture Comparison

Comparison of vulnerabilities from internal and external assessments.

Vulnerability Distribution by Severity

Distribution of vulnerabilities categorized by severity.

7. Recommendations for Remediation

  • Information Gathering: Improve monitoring and reduce exposure.
  • TCP/IP Configurations: Update configurations to align with best practices.
  • Firewall Settings: Strengthen firewall rules to minimize risk.

8. References

  • Internal Security Assessment: See attached Qualys report.
  • External Security Assessment: See attached Tenable report.