Security Audits
Knowledge is .
The George Jon security team will conduct an end-to-end security assessment of your environment and operating model, from planning to execution. We will conduct on-site and virtual interviews, coupled with remote environment review sessions, to diagnose the current state of your security posture. This is followed by a gap analysis, relative to industry best practices, and recommendations for galvanizing your environment across the following parameters:
- Data workflow and data management, including the end-to-end data handling process, from acquisition through remediation
- Identity and access management solutions for optimization opportunities and gap/weaknesses identification in process and controls
- Vulnerability management, from scanning to remediation, aligned with business SLAs
- Encryption methodologies in conjunction with data workflow and management
- Security architecture relative to zone separation, perimeter controls, egress filtering, and proxy internet access
- Cybersecurity operations, response plans, and process effectiveness/preparedness
- Application security configurations and recommend baseline images for security enhancement

Security Audit Benefits

Identifies weaknesses in your security posture that expose your business to unnecessary risk.

Explains industry Best Practices and how other organizations in the eDiscovery realm are protecting their environments

Provides insight across security tools and controls, backed by GJ testing, that ensures efficacy while avoiding platform performance and stability degradation

Forges a clear and defined roadmap for achieving a “Desired State” environment security posture

Delivers an end-to-end overview of your current data handling and management workflow, identifying key areas for improvement
Security Audit Framework
Our solution framework for conducting and delivering successful client Security Audits consists of three holistic phases to ensure we not only capture and present an accurate representation of your current state, but also understand and construct a roadmap for achieving the ideal future state.
Phase 1
Information Gathering
- Security Vision & Management Expectations
- Current InfoSec Policies and Procedures
- Existing Environment Documentation
- Data Workflow Documentation
- Client-required Information Security Controls
Assess & Baseline the Current State
- Security Tools and Configuration
- Cyber Ops and Response Plan
- Data Handling & Encryption
- Security-based Environment Pain Points
Phase 2
Gap Analysis
- Data Encryption
- Identity & Access Management
- Vulnerability Management & Patching
- Security Operations (SIEM)
- Security Architecture
- Data Handling
Prioritize Security Findings
- Alignment to Management Expectations
- Alignment to Industry Best Practices
- Alignment to Contractual Requirements
- Budget Considerations
- Implementation Intensiveness (complexity, impact, tradeoffs)
Phase 3
Security Health Report & Remediation Roadmap
- A comprehensive view of the current state, identifying critical security weaknesses and the associated remediations
- Prioritization of security concerns and the associated risks aligned with management acceptance
- Detailed implementation plan broken down by workstream, with budgetary and timeline estimates