Shtein Solutions provides general information security (IS) audit services.
Security audit is a comprehensive assessment of an organization's security systems, including the analysis and verification of all aspects of information protection, technologies, and processes aimed at ensuring the confidentiality, integrity, and availability of data. Security audits are conducted to identify vulnerabilities, assess the effectiveness of current security measures, and develop recommendations for improving security.
Security audits are conducted in accordance with various international standards and regulatory requirements, which provide a structured and systematic approach to assessing and improving the security of information systems. The main standards used for conducting security audits include:
ISO/IEC 27001 is an international standard for information security management systems (ISMS). It provides requirements for establishing, implementing, maintaining, and continuously improving an information security management system.
NIST Special Publication 800-53 is a guide by the National Institute of Standards and Technology (NIST) of the United States, providing recommendat
COBIT (Control Objectives for Information and Related Technologies) is a framework for IT management and governance. COBIT focuses on managing and controlling information technology and processes.
PCI DSS (Payment Card Industry Data Security Standard) is a security standard designed for organizations that handle payment cards. It establishes requirements for securing cardholder data.
GDPR (General Data Protection Regulation) is a regulation of the European Union aimed at protecting data and privacy of all EU citizens.
HIPAA (Health Insurance Portability and Accountability Act) is a U.S. law establishing standards for protecting medical information.
Sarbanes-Oxley Act (SOX) is a U.S. law aimed at protecting investors by improving the accuracy and reliability of corporate disclosures.
ITIL (Information Technology Infrastructure Library) is a set of practices for IT service management.
Security audits are a key component of an information security management strategy, helping organizations protect their data and reputation from threats and breaches.
The results of the audit can provide a good basis for planning information security activities in the organization for the coming years.
As part of the support service, we create an up-to-date risk map based on inspections, with recommendations and suggestions on what to solve, in what order, and how.
General cyber risk assessment
Infrastructure assessment
Applied assessment
Cloud environment assessment
Our company provides the following services:
Primary technological and basic checks in the field of information security. Inspection of the network architecture, security systems, access rights. Construction of a risk map.
More DetailsThis test identifies existing vulnerabilities in the infrastructure in order to formulate recommendations for their elimination.
Testing using social engineering methods. The purpose of the test is to identify the staff’s level cyber security threat awareness.
Lectures and trainings on staff awareness of information security threats, as well as trainings on secure development for programmers.
Checking the security of the company according to the protocol. The purpose of the audit is to show in which areas of information security there are shortcomings and how to correct them.
More DetailsWhen a cyber incident occurs, it is important to understand exactly what happened and how, and to address the causes and gaps in the firm's information security.
More DetailsThe email attack simulation tests the effectiveness of email security tools such as email gateways, antiviruses, sandboxes and others.
More DetailsWe will identify weaknesses in mobile and web applications, in remote service systems and develop recommendations for eliminating detected vulnerabilities.
More DetailsWe will identify problems in protecting user computers for running malicious applications and monitoring the
system.
Since 2010, we have done a lot of work. This includes penetration tests and security audits, risk management, incident investigations, as well as consultations and solution design.