How are security assessments performed?
    
    
 
Following initial technical and scoping exercises:
- Security configuration and controls defined in the External Security Manager (ESM) are examined for each database
 - Policies and procedures for formal and informal controls are evaluated for weaknesses
 - Poor or weak controls and protections for sensitive data, libraries, and user privileges are captured
 - A detailed report with summary, results, descriptions of vulnerabilities and a remediation project plan are delivered upon completion and reviewed with your team