{"id":5493,"date":"2024-09-03T15:14:37","date_gmt":"2024-09-03T18:14:37","guid":{"rendered":"https:\/\/pegasussecurity.com.br\/solutions\/framework\/"},"modified":"2025-02-23T19:54:29","modified_gmt":"2025-02-23T22:54:29","slug":"framework","status":"publish","type":"page","link":"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/","title":{"rendered":"Framework"},"content":{"rendered":"<div class=\"gb-container gb-container-858c92dd alignfull\">\n<div class=\"gb-container gb-container-60695833\">\n\n<h3 class=\"gb-headline gb-headline-984b62a1 gb-headline-text\"><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-3-color\">\u201cEnd to End\u201d<\/mark> Security Framework<\/h3>\n\n\n\n<p>Our Framework is a methodological framework that allows us to manage threats associated with Cybersecurity, based on the Client\u2019s business objectives and transforming Security into an enabler for new opportunities and digital transformation.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ecfc5a47\">\n<div class=\"gb-container gb-container-c110be55\">\n\n<h4 class=\"gb-headline gb-headline-2ea45815 gb-headline-text\">Governance, Compliance<br>and Risk<\/h4>\n\n\n\n<p>Within the scope of GRC, we analyze the needs, gaps and risks associated with the Client\u2019s business, through its processes and technologies. We define an E2E security strategy that guarantees an acceptable level of risk and resilience. We implement the necessary controls, ensuring compliance with regulatory and business obligations.   <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c14e8ef6\">\n\n<h4 class=\"gb-headline gb-headline-001b0950 gb-headline-text\">Digital Transformation<\/h4>\n\n\n\n<p>Security Engineering translates the Security strategy and controls into infrastructure, agnostically supporting the selection of Technologies and the implementation and development of the necessary capabilities to establish a defense Infrastructure. All this work provides the Visibility necessary for adequate Security Management. <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2155fa42\">\n\n<h4 class=\"gb-headline gb-headline-bd6d6879 gb-headline-text\">Management and Detection<\/h4>\n\n\n\n<p>We perform E2E Management of Security infrastructures in a modular manner, detecting and identifying vulnerabilities, threats and attacks in advance and automating processes for their correct execution. We also apply the intelligence acquired in our global environment to the daily processes of all our clients. <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-209eaa85\">\n\n<h4 class=\"gb-headline gb-headline-fc756631 gb-headline-text\">Response and Recovery<\/h4>\n\n\n\n<p>In the event of an attack or information leak, it is essential to have a Response team in place to control the environment and\/or the Incident, correct vulnerabilities and finally restore operational normality. Subsequent investigation of incidents allows for the necessary evolution of processes and environments. <\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-94254107\">\n<div class=\"gb-container gb-container-5df32c37\">\n\n<h4 class=\"gb-headline gb-headline-93c5efed gb-headline-text\">Strategy<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-bf5fc11a\">\n\n<h4 class=\"gb-headline gb-headline-5753f466 gb-headline-text\">Development<\/h4>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0ba5ff35\">\n\n<h4 class=\"gb-headline gb-headline-fa168645 gb-headline-text\">Operation, Processing<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-c4872dfa alignfull\">\n<div class=\"gb-container gb-container-c2ebfa31\">\n\n<h3 class=\"gb-headline gb-headline-cae8afba gb-headline-text\">Governance, Risk and Compliance<\/h3>\n\n\n\n<p>Companies need to act with a GRC vision with the ability to achieve objectives reliably, while addressing uncertainties and acting with integrity and agility. Acting strategically to manage an organization&#8217;s overall governance, enterprise risk management and regulatory compliance allows our clients to have a considerable competitive advantage. <\/p>\n\n\n\n<p>Areas such as internal audit, compliance, risk, legal, financial, IT, HR, as well as business lines, executive suite and the board of directors need to act in an integrated manner to ensure that the process is as assertive as possible, mitigating and making agile strategic decisions, allowing business objectives to be achieved and not suffering negative impacts during their operation.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-c6ca765a\">\n<div class=\"gb-container gb-container-df7580ab\">\n\n<h4 class=\"gb-headline gb-headline-b075b2a6 gb-headline-text\">Analyze<\/h4>\n\n\n<div class=\"gb-container gb-container-c073aa60\">\n\n<p class=\"gb-headline gb-headline-baf6b889 gb-headline-text\">ISMS Assessment and Maturity Level<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-91fba446\">\n\n<p class=\"gb-headline gb-headline-020161ba gb-headline-text\">Risk Assessment<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-00ffb2a3\">\n\n<p class=\"gb-headline gb-headline-0676ff78 gb-headline-text\">Technological Environment Assessment<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3e5a53db\">\n\n<p class=\"gb-headline gb-headline-d481bd3d gb-headline-text\">Privacy Assessment<br>\/ LGPD \/ GDPR<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2aac58ef\">\n\n<p class=\"gb-headline gb-headline-933c4187 gb-headline-text\">ISO27001 Assessment \/<br>PCI-DSS \/ NIST \/ CIS \/ Others<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-25fbd89d\">\n\n<h4 class=\"gb-headline gb-headline-f4f1cc1d gb-headline-text\">Define<\/h4>\n\n\n<div class=\"gb-container gb-container-3772b416\">\n\n<p class=\"gb-headline gb-headline-9d028ab4 gb-headline-text\">Security Strategy \/ PDSI<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-b5ca0a24\">\n\n<p class=\"gb-headline gb-headline-7f1125c2 gb-headline-text\">Risk Management Strategy and Model<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-387cf85a\">\n\n<p class=\"gb-headline gb-headline-63bf1262 gb-headline-text\">Business Continuity Strategy<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a35413f5\">\n\n<p class=\"gb-headline gb-headline-3f667b19 gb-headline-text\">Privacy and &nbsp;Compliance Strategy<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-4c3a8c15\">\n\n<p class=\"gb-headline gb-headline-60853bd1 gb-headline-text\">Cybernetic &nbsp;Resilience Model<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-4d511ab9\">\n\n<h4 class=\"gb-headline gb-headline-7d161ad6 gb-headline-text\">Implement<\/h4>\n\n\n<div class=\"gb-container gb-container-9fe9119a\">\n\n<p class=\"gb-headline gb-headline-31e5306c gb-headline-text\">Information Security Management System<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-37b8143c\">\n\n<p class=\"gb-headline gb-headline-b5def497 gb-headline-text\">Risk Management Model<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-50c97794\">\n\n<p class=\"gb-headline gb-headline-8d4acdae gb-headline-text\">Business Continuity Policy and Processes<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-28db6e53\">\n\n<p class=\"gb-headline gb-headline-b1ab3684 gb-headline-text\">&nbsp;&nbsp;&nbsp;Compliance and Governance Systems for Data Protection&nbsp;<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-e31921ca\">\n\n<h4 class=\"gb-headline gb-headline-368491ba gb-headline-text\">Comply with<\/h4>\n\n\n<div class=\"gb-container gb-container-521b219e\">\n\n<p class=\"gb-headline gb-headline-3cfe7995 gb-headline-text\">Security Policy and Procedures<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e0230d31\">\n\n<p class=\"gb-headline gb-headline-68ed2793 gb-headline-text\">Risk Management Policy<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-128b5a44\">\n\n<p class=\"gb-headline gb-headline-da5b77b8 gb-headline-text\">Business Continuity Plan<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d346528c\">\n\n<p class=\"gb-headline gb-headline-13b0c0b0 gb-headline-text\">Sectoral and Regulatory Regulations Business<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-ffb755ec\">\n<div class=\"gb-container gb-container-36289166\">\n\n<h4 class=\"gb-headline gb-headline-30e3d6d1 gb-headline-text\">Strategy<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-5eb25c71\">\n<div class=\"gb-container gb-container-a65cb60e\">\n\n<h3 class=\"gb-headline gb-headline-7bd4ec00 gb-headline-text\">Digital Transformation<\/h3>\n\n\n\n<p>The accelerated pace of your digital transformation based on the adoption of cutting-edge technologies such as cloud\/edge computing, Big Data and the Internet of Things (IoT) requires a strategic vision aligned with business objectives.<\/p>\n\n\n\n<p>The automation of cybersecurity solutions in conjunction with the management strategy is essential to deal with the growing number of cybersecurity threats, and can be complemented with machine learning systems, capable of detecting attack patterns and enabling rapid actions to contain incidents and\/or identified risks.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7b401caa\">\n<div class=\"gb-container gb-container-640723db\">\n\n<h4 class=\"gb-headline gb-headline-a0ea3a49 gb-headline-text\">Engineering<\/h4>\n\n\n<div class=\"gb-container gb-container-d09c5d87\">\n\n<p class=\"gb-headline gb-headline-8692c8be gb-headline-text\">Definition of Security Architecture<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ec1791ed\">\n\n<p class=\"gb-headline gb-headline-a4c95104 gb-headline-text\">Development of Operation Models \/ Managed Security<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a04182e4\">\n\n<p class=\"gb-headline gb-headline-505d988f gb-headline-text\">Development of SecDevOps Framework<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d6a145f3\">\n\n<p class=\"gb-headline gb-headline-fa5f1254 gb-headline-text\">Cloud Security Strategy<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-5ec453a5\">\n\n<p class=\"gb-headline gb-headline-5ef98236 gb-headline-text\">IoT \/ OT Strategy<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-2e658524\">\n\n<p class=\"gb-headline gb-headline-ad993913 gb-headline-text\">SASE<br>Secure Access Service Edge<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-352b50c5\">\n\n<h4 class=\"gb-headline gb-headline-5ac20156 gb-headline-text\">Technologies<\/h4>\n\n\n<div class=\"gb-container gb-container-4389cb32\">\n\n<p class=\"gb-headline gb-headline-d468908e gb-headline-text\">Endpoint Security<br>EDR \/ XDR \/ MDM \/ MDR<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-b1e0586e\">\n\n<p class=\"gb-headline gb-headline-7f792b17 gb-headline-text\">Aplication Security<br>WAF \/ AntiSpam \/ \u2026<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-21003a7c\">\n\n<p class=\"gb-headline gb-headline-9776c511 gb-headline-text\">Networking Security<br>ADDoS \/ Proxy \/ DNS \/ Etc.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-81f0a40b\">\n\n<p class=\"gb-headline gb-headline-2aae6a90 gb-headline-text\">Perimeter Security<br>NGFirewal \/ IPS \/ IDS \/ \u2026<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7e1de4c5\">\n\n<p class=\"gb-headline gb-headline-4b1e8157 gb-headline-text\">SIEM \u2013 SIEMaaS<br>UEBA \/ UBA<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-6391676f\">\n\n<p class=\"gb-headline gb-headline-d591c44a gb-headline-text\">IAM &#8211; Identity &amp;<br>Access Mgmt<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-77282853\">\n\n<h4 class=\"gb-headline gb-headline-4c69cd5e gb-headline-text\">Development<\/h4>\n\n\n<div class=\"gb-container gb-container-c4d06b5a\">\n\n<p class=\"gb-headline gb-headline-5ed16949 gb-headline-text\">Implementation and Migration of Technologies<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-eafeab06\">\n\n<p class=\"gb-headline gb-headline-884ee53a gb-headline-text\">Technology Integration<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-545ec886\">\n\n<p class=\"gb-headline gb-headline-8b7cc003 gb-headline-text\">Fine Tuning and Optimization<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7c141ef0\">\n\n<p class=\"gb-headline gb-headline-5744ba8e gb-headline-text\">Automation<br>SOAR<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-06913430\">\n\n<p class=\"gb-headline gb-headline-49311362 gb-headline-text\">Playbooks &amp; Runbooks<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0c291b26\">\n\n<h4 class=\"gb-headline gb-headline-74f8f5b8 gb-headline-text\">Visibility<\/h4>\n\n\n<div class=\"gb-container gb-container-66173ed0\">\n\n<p class=\"gb-headline gb-headline-d749e32c gb-headline-text\">KPIs \/ SLAs \/ SLOs<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e3b492e8\">\n\n<p class=\"gb-headline gb-headline-7409708a gb-headline-text\">Dashboards<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3e3b18ab\">\n\n<p class=\"gb-headline gb-headline-07b2e397 gb-headline-text\">Security Feed<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0cba9c39\">\n<div class=\"gb-container gb-container-201b707c\">\n\n<h4 class=\"gb-headline gb-headline-47e9d18d gb-headline-text\">Development<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-86c74fdf alignfull\">\n<div class=\"gb-container gb-container-9e181546\">\n\n<h3 class=\"gb-headline gb-headline-76fc12b6 gb-headline-text\">Operation &amp; Monitoring<\/h3>\n\n\n\n<p>The security operations department (SOC) is responsible for the continuous monitoring and analysis of an organization&#8217;s security events and actions. The goal is to detect, analyze, and respond to cybersecurity incidents using a combination of technology solutions and a strong set of manual and automated processes, working in conjunction with organizational incident response processes to ensure that security issues are addressed quickly in the event of crises and incidents. <\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-609a1b9d\">\n<div class=\"gb-container gb-container-975f8a14\">\n\n<h4 class=\"gb-headline gb-headline-d14a5668 gb-headline-text\">Management<\/h4>\n\n\n<div class=\"gb-container gb-container-8e2ea1f7\">\n\n<p class=\"gb-headline gb-headline-71aed820 gb-headline-text\">Managed Security<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-ad7b919b\">\n\n<p class=\"gb-headline gb-headline-f96c8d55 gb-headline-text\">Policy creation and management<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-24610728\">\n\n<p class=\"gb-headline gb-headline-cac3d364 gb-headline-text\">Rules creation and review<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-80f5ce01\">\n\n<p class=\"gb-headline gb-headline-8911f557 gb-headline-text\">Availability monitoring<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-dc1da9c6\">\n\n<p class=\"gb-headline gb-headline-c86464f4 gb-headline-text\">Event and alert correlation<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-77b3e526\">\n\n<h4 class=\"gb-headline gb-headline-c68f1bfe gb-headline-text\">Automation<\/h4>\n\n\n<div class=\"gb-container gb-container-8e9e2014\">\n\n<p class=\"gb-headline gb-headline-8e5ae64a gb-headline-text\">Processes and procedures<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-71c0b5e3\">\n\n<p class=\"gb-headline gb-headline-c8a91d0b gb-headline-text\">Alerts and notifications<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f5f410af\">\n\n<p class=\"gb-headline gb-headline-3f5ec72e gb-headline-text\">Playbooks &amp; Runbooks<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-5a7c8bb0\">\n\n<p class=\"gb-headline gb-headline-e4d9e0c2 gb-headline-text\">First-level response<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f605cb43\">\n\n<p class=\"gb-headline gb-headline-4db75b69 gb-headline-text\">Development of incident scenario tests<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-ec08e65a\">\n\n<h4 class=\"gb-headline gb-headline-f7f32644 gb-headline-text\">Detection<\/h4>\n\n\n<div class=\"gb-container gb-container-3b192186\">\n\n<p class=\"gb-headline gb-headline-a2caad8a gb-headline-text\">Zero Day Attack<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-24f1cbc1\">\n\n<p class=\"gb-headline gb-headline-c3c09fe9 gb-headline-text\">Advanced and Persistent Attacks<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-8601a911\">\n\n<p class=\"gb-headline gb-headline-5cebcf44 gb-headline-text\">ADDoS Attacks<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-299f1311\">\n\n<p class=\"gb-headline gb-headline-4eb3106f gb-headline-text\">Unauthorized use of the brand<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e56f6ef6\">\n\n<p class=\"gb-headline gb-headline-5e8b3ac2 gb-headline-text\">Data Leakage &amp; Credential Theft<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-6113ea43\">\n\n<p class=\"gb-headline gb-headline-e024558a gb-headline-text\">Fake Websites and Apps \/ Phishing<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e0fd4406\">\n\n<p class=\"gb-headline gb-headline-be7ccf3e gb-headline-text\">Vulnerability Scanning<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-f8f3b4fb\">\n\n<h4 class=\"gb-headline gb-headline-73709a75 gb-headline-text\">Intelligence<\/h4>\n\n\n<div class=\"gb-container gb-container-f5dda85f\">\n\n<p class=\"gb-headline gb-headline-99f724a1 gb-headline-text\">Threat Hunting<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-74b0a591\">\n\n<p class=\"gb-headline gb-headline-8dd24c17 gb-headline-text\">UBA \/ UEBA<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-0a01dfbe\">\n\n<p class=\"gb-headline gb-headline-03d44913 gb-headline-text\">Sectorized Attacks<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-84b5c4eb\">\n\n<p class=\"gb-headline gb-headline-8e71ae44 gb-headline-text\">IoC \/ Feeds<br>Threat Intelligence<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-52c445bc\">\n<div class=\"gb-container gb-container-09c30832\">\n\n<h4 class=\"gb-headline gb-headline-c8188a67 gb-headline-text\">Operation, Processing<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-1c49a98d\">\n<div class=\"gb-container gb-container-3f6f8135\">\n\n<h3 class=\"gb-headline gb-headline-2c1606f3 gb-headline-text\">Response &amp; Recovery<\/h3>\n\n\n\n<p>A robust vulnerability and risk management process combined with Response and Recovery processes provide a defined framework for our clients to prepare for possible security incidents. These processes are supported by the management and operations area, providing an efficient overview of the processes and procedures that need to be carried out quickly in times of crisis.<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3fda3b2f\">\n<div class=\"gb-container gb-container-0eecf48d\">\n\n<h4 class=\"gb-headline gb-headline-2764f8a0 gb-headline-text\">Respond<\/h4>\n\n\n<div class=\"gb-container gb-container-b2a64ed6\">\n\n<p class=\"gb-headline gb-headline-7b581b94 gb-headline-text\">Incident Response Plans<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-abf8fc8c\">\n\n<p class=\"gb-headline gb-headline-5d36b0fa gb-headline-text\">Policies, Standards and Legislation<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-8adc701c\">\n\n<p class=\"gb-headline gb-headline-735216a9 gb-headline-text\">Training and Qualification Plan<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-dcc7efe4\">\n\n<p class=\"gb-headline gb-headline-0299325f gb-headline-text\">Monitoring Tools<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a3461eb7\">\n\n<p class=\"gb-headline gb-headline-c4590118 gb-headline-text\">24\u00d77 Team<br>Incident Response<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-bfa85d0d\">\n\n<p class=\"gb-headline gb-headline-96cc7ccf gb-headline-text\">Communication Plan (Customers, Employees and Suppliers)<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0691023a\">\n\n<h4 class=\"gb-headline gb-headline-0435af1a gb-headline-text\">Correction<\/h4>\n\n\n<div class=\"gb-container gb-container-9d42a88f\">\n\n<p class=\"gb-headline gb-headline-f0b02d4f gb-headline-text\">Asset and Application Mapping<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-197f01f6\">\n\n<p class=\"gb-headline gb-headline-5905bb2c gb-headline-text\">Threat and Vulnerability Management<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-173a45cd\">\n\n<p class=\"gb-headline gb-headline-792eadfa gb-headline-text\">Mobile, Infrastructure and WEB Environment Review Plans<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-d1fffe81\">\n\n<p class=\"gb-headline gb-headline-23e0ce1e gb-headline-text\">Access Control Plan and Review<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-28a4e41f\">\n\n<p class=\"gb-headline gb-headline-85785f50 gb-headline-text\">Patch Management<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-bf24301c\">\n\n<h4 class=\"gb-headline gb-headline-86b41039 gb-headline-text\">Recover<\/h4>\n\n\n<div class=\"gb-container gb-container-dc6f4add\">\n\n<p class=\"gb-headline gb-headline-ca558972 gb-headline-text\">Mobile, Infrastructure and WEB Environment Recovery Plans<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-7db23c47\">\n\n<p class=\"gb-headline gb-headline-21fc3fa1 gb-headline-text\">Communication (Customers, Employees and Suppliers)<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-de90f7b5\">\n\n<p class=\"gb-headline gb-headline-c63a7065 gb-headline-text\">Periodic Testing<\/p>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-bc6169f3\">\n\n<h4 class=\"gb-headline gb-headline-f1244ba9 gb-headline-text\">Investigate<\/h4>\n\n\n<div class=\"gb-container gb-container-eb01df8b\">\n\n<p class=\"gb-headline gb-headline-5c7908fc gb-headline-text\">Forensic Expertise<br>DFIR<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-a4ee350c\">\n\n<p class=\"gb-headline gb-headline-f3f4d34e gb-headline-text\">Security Event Correlation<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-e7ef64c7\">\n\n<p class=\"gb-headline gb-headline-bd67dc4a gb-headline-text\">Identify Suspicious\/Critical Events<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-21b38702\">\n\n<p class=\"gb-headline gb-headline-2899480c gb-headline-text\">Continuous Monitoring System<\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-3116d2f7\">\n\n<p class=\"gb-headline gb-headline-d6c89fce gb-headline-text\">Plans and procedures for detecting incidents<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-77068ee8\">\n<div class=\"gb-container gb-container-5da5bc31\">\n\n<h4 class=\"gb-headline gb-headline-f878a2d1 gb-headline-text\">Operation, Processing<\/h4>\n\n<\/div>\n<\/div>\n<\/div><div class=\"gb-container gb-container-3bc287d4 alignfull\">\n<div class=\"gb-container gb-container-42b517f8\">\n<div class=\"gb-container gb-container-a6c54fcb\">\n\n<h2 class=\"gb-headline gb-headline-af8f3ed1 gb-headline-text\">Learn about the Pegasus Security Framework<\/h2>\n\n\n<div class=\"gb-container gb-container-efc1e4cc\">\n\n<a class=\"gb-button gb-button-59c63e2b\" href=\"https:\/\/pegasussecurity.com.br\/contact\/\"><span class=\"gb-icon\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 496 512\"><path fill=\"currentColor\" d=\"M248 8C111 8 0 119 0 256s111 248 248 248 248-111 248-248S385 8 248 8zm0 96c48.6 0 88 39.4 88 88s-39.4 88-88 88-88-39.4-88-88 39.4-88 88-88zm0 344c-58.7 0-111.3-26.6-146.5-68.2 18.8-35.4 55.6-59.8 98.5-59.8 2.4 0 4.8.4 7.1 1.1 13 4.2 26.6 6.9 40.9 6.9 14.3 0 28-2.7 40.9-6.9 2.3-.7 4.7-1.1 7.1-1.1 42.9 0 79.7 24.4 98.5 59.8C359.3 421.4 306.7 448 248 448z\"><\/path><\/svg><\/span><span class=\"gb-button-text\">Talk to a consultant and schedule a demonstration.<\/span><\/a>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u201cEnd to End\u201d Security Framework Our Framework is a methodological framework that allows us to manage threats associated with Cybersecurity, based on the Client\u2019s business objectives and transforming Security into an enabler for new opportunities and digital transformation. Governance, Complianceand Risk Within the scope of GRC, we analyze the needs, gaps and risks associated with &#8230; <a title=\"Framework\" class=\"read-more\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/\" aria-label=\"Read more about Framework\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":5362,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-5493","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Framework - Pegasus Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Framework - Pegasus Security\" \/>\n<meta property=\"og:description\" content=\"\u201cEnd to End\u201d Security Framework Our Framework is a methodological framework that allows us to manage threats associated with Cybersecurity, based on the Client\u2019s business objectives and transforming Security into an enabler for new opportunities and digital transformation. Governance, Complianceand Risk Within the scope of GRC, we analyze the needs, gaps and risks associated with ... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Pegasus Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-23T22:54:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/pegasus.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1098\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/framework\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/framework\\\/\",\"name\":\"Framework - Pegasus Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\"},\"datePublished\":\"2024-09-03T18:14:37+00:00\",\"dateModified\":\"2025-02-23T22:54:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/framework\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/framework\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/framework\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solutions\",\"item\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"name\":\"Pegasus Security\",\"description\":\"Cybersecurity for All\",\"publisher\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\"},\"alternateName\":\"Pegasus\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#organization\",\"name\":\"Pegasus Security\",\"alternateName\":\"Pegasus Security\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"contentUrl\":\"https:\\\/\\\/pegasussecurity.com.br\\\/wp-content\\\/uploads\\\/cropped-pegasus-white-logo.webp\",\"width\":392,\"height\":328,\"caption\":\"Pegasus Security\"},\"image\":{\"@id\":\"https:\\\/\\\/pegasussecurity.com.br\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Framework - Pegasus Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/","og_locale":"en_US","og_type":"article","og_title":"Framework - Pegasus Security","og_description":"\u201cEnd to End\u201d Security Framework Our Framework is a methodological framework that allows us to manage threats associated with Cybersecurity, based on the Client\u2019s business objectives and transforming Security into an enabler for new opportunities and digital transformation. Governance, Complianceand Risk Within the scope of GRC, we analyze the needs, gaps and risks associated with ... Read more","og_url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/","og_site_name":"Pegasus Security","article_modified_time":"2025-02-23T22:54:29+00:00","og_image":[{"width":1098,"height":500,"url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/pegasus.jpg","type":"image\/jpeg"}],"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/","url":"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/","name":"Framework - Pegasus Security","isPartOf":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#website"},"datePublished":"2024-09-03T18:14:37+00:00","dateModified":"2025-02-23T22:54:29+00:00","breadcrumb":{"@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pegasussecurity.com.br\/en\/solutions\/framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pegasussecurity.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Solutions","item":"https:\/\/pegasussecurity.com.br\/en\/solutions\/"},{"@type":"ListItem","position":3,"name":"Framework"}]},{"@type":"WebSite","@id":"https:\/\/pegasussecurity.com.br\/en\/#website","url":"https:\/\/pegasussecurity.com.br\/en\/","name":"Pegasus Security","description":"Cybersecurity for All","publisher":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#organization"},"alternateName":"Pegasus","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pegasussecurity.com.br\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pegasussecurity.com.br\/en\/#organization","name":"Pegasus Security","alternateName":"Pegasus Security","url":"https:\/\/pegasussecurity.com.br\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/","url":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","contentUrl":"https:\/\/pegasussecurity.com.br\/wp-content\/uploads\/cropped-pegasus-white-logo.webp","width":392,"height":328,"caption":"Pegasus Security"},"image":{"@id":"https:\/\/pegasussecurity.com.br\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/comments?post=5493"}],"version-history":[{"count":2,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5493\/revisions"}],"predecessor-version":[{"id":5539,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5493\/revisions\/5539"}],"up":[{"embeddable":true,"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/pages\/5362"}],"wp:attachment":[{"href":"https:\/\/pegasussecurity.com.br\/en\/wp-json\/wp\/v2\/media?parent=5493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}