Compromise assessment is a type of cyber risk assessment that identifies threats lurking in an organization’s network. First, cybersecurity experts identify indicators of compromise (IOCs). Then, they investigate in-depth the risk-prioritized findings. A report shares these findings and identifies ways to reduce the attack surface.
Compromise assessment analyzes cyber risk exposure, such as data exfiltration and sabotage, command and control activities, user authentication abnormalities, malware persistence mechanisms, and vulnerable network host and application configurations. Compromise assessment is part of cyber incident response.
Incident response is an organization’s approach to addressing cyberattacks and cybersecurity incidents. The goal of incident response is to contain and minimize damage caused by a breach and reduce recovery time and costs.
Incident response includes cyber incident response, data breach response, business email compromise response, ransomware response and digital forensics.