DESIGN. BUILD. SECURE
What We Do
Preparing for a cloud deployment is tough enough - let us take on the security and privacy aspects. We can work with both administrative and technical teams to conduct a Technical Risk Assessment (TRA) and outline the risks that need to be addressed. This includes creating an Action Plan (AP) with your project team to implement these new system and process controls.
We use ISO standards as the yard stick for controls that should be considered and deployed. It also allows us to ensure your specific cloud security needs are considered and addressed.
We consider all aspects of a cloud deployment regardless of architecture or deployment model used. This includes:
- Reviewing MSAs and other contract vehicles to determine what was negotiated. Hopefully, we are engaged prior to contract to assist in selection of vendors and provide the necessary support when writing the MSA.
- Clearly understanding the security capabilities of your cloud provider and ensuring your team understands the residual risk elements including the threat vectors for your data.
- Interviewing staff members to understand the implementation aspects of the cloud service and ensuring all technical control elements are reviewed in a TRA.
- Providing a detailed action plan to ensure critical risks are eliminated quickly and those that can wait are scheduled accordingly.
- Conduct a Privacy Impact Assessment to determine if and where critical data is being collected, processed, and stored.
While mobile has surpassed web for development projects, many programs lack even a basic System Development Lifecycle (SDLC) discipline. As a result, apps are created that lack security threat modelling and security gates that evaluate any new programming risk that might of been introduced to the source code.
We have developed a methodology that allows for software to be validated against vulnerabilities. The focus is on testing to flush these out using the source code where possible to conduct these tests. This includes network layer testing to see data that traverses connections and user identifiable details in these transactions.
Our services includes the following aspects:
- Code evaluations and best practice
- Determine cloud based apps and potential risks associated
- BYOD infrastructure assessments
- Intrusion and pattern monitoring
- Regulatory compliance
- System auditing
IoT is the future of technology and takes many aspects of mobile and cloud to a whole new level. While many companies are still considering their options in this developing market, the time is right to identify the risk posture of the potential solution and ensure that security and privacy have been designed into your solution.
While some organizations might already have solutions on the market, it’s not too late to consider how to secure the next revision. The key is conducting a security threat model and then update it accordingly. This includes ensuring the design and test plans validate the threats. If issues are found infield, they can easily be dealt with using the updated design and development process.
We also perform end-to-end solutions testing for organizations who are looking for a higher level of assurance. This can include code assessments and vulnerability assessments against both hardware and software components.
Are you considering new IT projects but don’t have a security sounding board? Have to meet new security requirements but don’t know where to start? Are you planning for growth and want to make sure that security and privacy are factored into your corporate plan? No problem, we can provide the necessary guidance on all of these and more. Our Virtual CSO service was designed to help companies of all sizes get the needed guidance when and where they need it. We aim to be your one-stop for guidance on any project where security and privacy are important but that you don’t have adequate resources to provide the necessary support.
- Here are some ways you can leverage our expertise:
- Strategy Planning Sessions
- Project Risk Assessments
- Support the creation of ISMS
- Breach playbook Technology assessments
- Solution and architecture guidance
Connect with us to find out how we can help build a program to suit your specific business needs and budget.
Businesses have long struggled with how to handle the unfortunate moment when a network intrusion becomes a data breach. The security team at TwelveDot has developed a pre- and post- breach methodology to help organizations prepare for the day when a compromise to privileged data occurs.
Based on international standards, our methodology considers the full breach picture from understanding the risk of data exposure, to breach prevention and incident response. Our holistic approach guides companies through the full breach lifecycle to mitigate risk and reduce company exposure to threats and breaches.
Understanding the risk of any project that handles critical data is fundamental to a pre-breach program. Ensuring that adequate technical controls are are in place and that policies and procedures governing security practices are well communicated is paramount in a sound security program. TwelveDot will build a customized playbook to protect and secure your assets.
The ability to detect and perform an incident response that follows a breach aids greatly in tightening security practices by identifying methods that will prevent further compromise in the future. Our team can help you implement procedures to handle this independently and can also be called on to assist in emergency situations.
Building and maintaining an ISMS (Information Security Management System) is not always easy - especially for larger organizations who have already developed processes and procedures for managing risk. However, more governments, financial institutions and even software vendors now require partners to be compliant with ISO/ IEC 27001. Many countries in Europe and Asia are now requiring certain sector companies to be come 27000 certified to operate. Our approach to implementing an ISMS is divided into phases that help organizations big or small easily prepare for deploying an ISMS. The process is initiated with a gap analysis to better understand the organization and the current set of security controls that have been deployed. We then work with customers to understand the mandatory controls that will be required and provide technical consulting to implement these controls. Once completed, we work with customers to develop the Statement of Applicability (SoA) that will be used towards obtaining certification. While not always the goal of an organization who want an ISMS, it typically is the long term strategy for many companies.
Applying our intimate knowledge of the ISO 27000 standards family and technical deployment know-how, we can provide all the services necessary to support your implementation of an ISMS. If you think an ISMS is only for big companies, think again. Small and medium businesses also benefit from the controls that an ISMS requires to ensure a strong security foundation for the future. It will also significantly reduce the cost of deploying these aspects for a large company that now needs to comply to this standard to win large contracts or new customers. This investment in an ISMS will help prepare a company for its future.
1. Pre-assessment and Breach Playbook Working with your organization at multiple levels, we attempt to prepare your organization to better deal with an incident when it occurs. We draft a Breach Playbook that looks at multiple aspects specific to your organization and aligns with current systems and methodologies used for business processes. For this, we help to implement controls that will aid in the triage of an incident and its subsequent mitigation.
2. Incident Management When deployed, our team of analysts work with business and technical staff to enact the Breach Playbook. This ensures all parties know their role during an incident and can perform their tasks accordingly. This will include providing both remote and on-site support, to handling the investigative aspects of the incident to determine scope and impact. At the onset, we will deploy secure communications with the assumption that current communications channels have potentially been impacted. This ensures that discussions and data exchanges remain secure during the incident.
3. Impact Assessment We use system and network resources to quickly and efficiently identify the impacts. This may include aspects such as:
- Staff interviews
- Analysis of system and access logs
- System dumps and binary analysis
- Malware analysis
4. Remediation: Our team of analysts will provide the necessary road map to incident containment and remediation based on the activities of the intrusion. We will provide guidance on how to minimize these attacks in the future and deploy the necessary controls to ensure that weaknesses that could be exploited in the future are addressed.
5. Lessons Learned After the incident has been contained, we provide guidance on how to ensure similar threats can be mitigated in the future with better security controls.
ISO based approach
TwelveDot is dedicated to the development of ISO standards as both experts and conveners of several committees. As such, we rely on ISO/IEC 27035 - Information Security Incident Management to drive our solution. As a multiple part standard, we are guided by the principles for breach prevention, identification, mitigation and eradication. Having a structured approach allows to provide a higher level of assurance that the compromise is properly dealt with and ensure the organization impacted will be functional in the quickest time possible with minimal impact.
While we attempt to ensure that companies are prepared prior to breach, in many instances we are engaged without the necessary controls in place. In these situations, we will use additional forensic methods to determine the possible timeline and target assets of the breach. This may include analysis of system and device memory, data captures once engaged and interviews with impacted staff.
1. Reconnaissance: we gather actionable intelligence that may be used to breach the organization’s perimeter. Using a comprehensive suite of known and proprietary open source intelligence techniques (i.e. scouring message boards, search engines, DNS interrogation, etc.) we collect information such as user credentials leaked inadvertently via document meta-data or online backups to network service banners. In addition, we actively probe the organization’s perimeter to determine its public footprint on the Internet and what kind of entry points may exist. This phase usually consumes around 50% of the time allotted for the assessment.
2. Scanning: using automated and manual processes, we scan for vulnerabilities that may exist at the network, application, or operating system layers. TwelveDot prides itself on being a highly technical firm that is capable of truly understanding the underlying technologies that power today’s environments. We understand that automated processes can only uncover the “low hanging fruit” which in most cases accounts for only 20-40% of the vulnerabilities that may exist. More sophisticated vulnerabilities can only be discovered by manually reverse engineering or testing components at all layers (i.e. presentation to transport layers). This is where our in- depth knowledge of technology comes into play. We use low-level debugging techniques to identify the most sophisticated, hard-to-find vulnerabilities, just like a professional adversary would.
3. Exploitation: using the information gained in the first two steps, we prioritize which systems and vulnerabilities may lead us closer to the exercise’s target. Great care is taken to ensure that the methods of exploitation we use are not destructive in nature and protect our client’s sensitive information. The objective of exploitation is not to deny or degrade service but to gain unauthorized access to a system, application or data repository. Means by which we exploit systems may include, but are not limited to:
- Controlled exploitation of buffer overflow conditions;
- Remote code/command execution;
- Remote file inclusion;
- Authentication bypass/Privilege escalation; and
- Social Engineering (if required)
In the case of social engineering attacks, an executable may be sent to a client within the organization to establish backdoor access.
4. Post-exploitation: once an initial foothold is established, we repeat the steps above to identify internal vulnerabilities or weaknesses to penetrate further into the environment. This phase may involve escalating privileges and pivoting to other systems within the network.
Vulnerabilities discovered within each of these phases are recorded and given a rating based on the rating methodology.
TwelveDot was created to help businesses of all size deal with information and cyber security issues. While organizations of all sizes struggle to ensure their data and operations are secure on a daily basis, many miss vital warning signs that something is amiss. Often data breaches trigger a focus on security, but it doesn’t have to be that extreme. We help companies better understand their true data risks and how their teams can manage that effectively on a daily basis. We help demystify the marketing speak of security solutions and focus on the risk and exposure elements. Only then can an organization truly offer a solution that is both secure and user friendly. TwelveDot is devoted to being your unbiased, objective and collaborative partner. We respect your privacy and do not share your sensitive information nor do we keep your data.
Facts About Us
Hetal SutharSr. Technical Security Analyst
Tom BoyleSr. Technical Analyst - Infrastructure
Jared BroughtonHead Developer, Web and App Pen Testing
Jon CastiglioneUX and Mobile Developer
Abhishek JoshiSW and HW Engineer
Wayne HendryCommunity Manager
We are proud to be a supporting member fo the IoXT pledge. This group was formed on the basis that all IoT products need to have a basis security features regardless sector. While as security practisioners we want to see…
IoT security has become a big reason to buyers not purchasing solutions. As a result, learning how to determine the security and privacy risks of a product are going to be key. Our CEO is going to be presenting a…
If your Toronto and are tracking IoT security and privacy you need to head to the Internet Governance Forum (IGF) on Feb. 27th and the ISOC Multistakeholder events on Feb. 28th. Our CEO will be on a Panel for the…
Message From Founder
When I started TwelveDot, I wanted to fill a void that was lacking in many big box security consulting companies — namely a global perspective. While many big box global consulting firms offer local resources around the globe, the resources have no global expertise. I wanted to share our global context and expertise with customers both in Canada and around the globe. This includes the standards work we have completed and will continue to develop in both ISO and ITU. We believe it is very important to base our advice on accepted and recognized security best practices. While we have a range of services to help companies, we focus on technologies and solutions around mobile, cloud and IoT. Many companies are struggling to secure these solutions. Connect with us to see how we can help you solve your security challenges. Chances are we’ve already helped someone like you solve a similar problem.Faud Khan
858 Bank Street, Suite 100
Ottawa, ON, Canada
+1 (613) 447-3393
TwelveDot Inc. All Rights Reserved © 2010-2019