Framework

Home » Solutions » Framework

Framework

“End to End” Security Framework

Our Framework is a methodological framework that allows us to manage threats associated with Cybersecurity, based on the Client’s business objectives and transforming Security into an enabler for new opportunities and digital transformation.

Governance, Compliance
and Risk

Within the scope of GRC, we analyze the needs, gaps and risks associated with the Client’s business, through its processes and technologies. We define an E2E security strategy that guarantees an acceptable level of risk and resilience. We implement the necessary controls, ensuring compliance with regulatory and business obligations.

Digital Transformation

Security Engineering translates the Security strategy and controls into infrastructure, agnostically supporting the selection of Technologies and the implementation and development of the necessary capabilities to establish a defense Infrastructure. All this work provides the Visibility necessary for adequate Security Management.

Management and Detection

We perform E2E Management of Security infrastructures in a modular manner, detecting and identifying vulnerabilities, threats and attacks in advance and automating processes for their correct execution. We also apply the intelligence acquired in our global environment to the daily processes of all our clients.

Response and Recovery

In the event of an attack or information leak, it is essential to have a Response team in place to control the environment and/or the Incident, correct vulnerabilities and finally restore operational normality. Subsequent investigation of incidents allows for the necessary evolution of processes and environments.

Strategy

Development

Operation, Processing

Governance, Risk and Compliance

Companies need to act with a GRC vision with the ability to achieve objectives reliably, while addressing uncertainties and acting with integrity and agility. Acting strategically to manage an organization’s overall governance, enterprise risk management and regulatory compliance allows our clients to have a considerable competitive advantage.

Areas such as internal audit, compliance, risk, legal, financial, IT, HR, as well as business lines, executive suite and the board of directors need to act in an integrated manner to ensure that the process is as assertive as possible, mitigating and making agile strategic decisions, allowing business objectives to be achieved and not suffering negative impacts during their operation.

Analyze

ISMS Assessment and Maturity Level

Risk Assessment

Technological Environment Assessment

Privacy Assessment
/ LGPD / GDPR

ISO27001 Assessment /
PCI-DSS / NIST / CIS / Others

Define

Security Strategy / PDSI

Risk Management Strategy and Model

Business Continuity Strategy

Privacy and  Compliance Strategy

Cybernetic  Resilience Model

Implement

Information Security Management System

Risk Management Model

Business Continuity Policy and Processes

   Compliance and Governance Systems for Data Protection 

Comply with

Security Policy and Procedures

Risk Management Policy

Business Continuity Plan

Sectoral and Regulatory Regulations Business

Strategy

Digital Transformation

The accelerated pace of your digital transformation based on the adoption of cutting-edge technologies such as cloud/edge computing, Big Data and the Internet of Things (IoT) requires a strategic vision aligned with business objectives.

The automation of cybersecurity solutions in conjunction with the management strategy is essential to deal with the growing number of cybersecurity threats, and can be complemented with machine learning systems, capable of detecting attack patterns and enabling rapid actions to contain incidents and/or identified risks.

Engineering

Definition of Security Architecture

Development of Operation Models / Managed Security

Development of SecDevOps Framework

Cloud Security Strategy

IoT / OT Strategy

SASE
Secure Access Service Edge

Technologies

Endpoint Security
EDR / XDR / MDM / MDR

Aplication Security
WAF / AntiSpam / …

Networking Security
ADDoS / Proxy / DNS / Etc.

Perimeter Security
NGFirewal / IPS / IDS / …

SIEM – SIEMaaS
UEBA / UBA

IAM – Identity &
Access Mgmt

Development

Implementation and Migration of Technologies

Technology Integration

Fine Tuning and Optimization

Automation
SOAR

Playbooks & Runbooks

Visibility

KPIs / SLAs / SLOs

Dashboards

Security Feed

Development

Operation & Monitoring

The security operations department (SOC) is responsible for the continuous monitoring and analysis of an organization’s security events and actions. The goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of manual and automated processes, working in conjunction with organizational incident response processes to ensure that security issues are addressed quickly in the event of crises and incidents.

Management

Managed Security

Policy creation and management

Rules creation and review

Availability monitoring

Event and alert correlation

Automation

Processes and procedures

Alerts and notifications

Playbooks & Runbooks

First-level response

Development of incident scenario tests

Detection

Zero Day Attack

Advanced and Persistent Attacks

ADDoS Attacks

Unauthorized use of the brand

Data Leakage & Credential Theft

Fake Websites and Apps / Phishing

Vulnerability Scanning

Intelligence

Threat Hunting

UBA / UEBA

Sectorized Attacks

IoC / Feeds
Threat Intelligence

Operation, Processing

Response & Recovery

A robust vulnerability and risk management process combined with Response and Recovery processes provide a defined framework for our clients to prepare for possible security incidents. These processes are supported by the management and operations area, providing an efficient overview of the processes and procedures that need to be carried out quickly in times of crisis.

Respond

Incident Response Plans

Policies, Standards and Legislation

Training and Qualification Plan

Monitoring Tools

24×7 Team
Incident Response

Communication Plan (Customers, Employees and Suppliers)

Correction

Asset and Application Mapping

Threat and Vulnerability Management

Mobile, Infrastructure and WEB Environment Review Plans

Access Control Plan and Review

Patch Management

Recover

Mobile, Infrastructure and WEB Environment Recovery Plans

Communication (Customers, Employees and Suppliers)

Periodic Testing

Investigate

Forensic Expertise
DFIR

Security Event Correlation

Identify Suspicious/Critical Events

Continuous Monitoring System

Plans and procedures for detecting incidents

Operation, Processing

Learn about the Pegasus Security Framework