Request for quotation
Your local contact person
We will be happy to provide you with a tailor-made offer for SRAA.
Understanding potential vulnerabilities and threats to your IT infrastructure
Compliance with the requirements set by the Office of the Government Chief Information Officer (OGCIO)
Strengthen security controls & protect sensitive information
Unbiased and objective assessment
SRAA is intended to be carried out at planned intervals and after significant changes.
Planning plays a crucial role in identifying and choosing the most effective and efficient approaches for conducting the audit or assessment.
The following key elements should be defined before audit/ assessment:
It is crucial for determining the value of assets and assessing associated risks. It is essential to perform risk analysis on various aspects, including but not limited to:
In general, the risk analysis process can be divided into several sub-processes, which include:
Improvement by the Organization
Typically, the organization will take actions to address the risks identified from SRA, before performing a following security audit. Nevertheless, a security audit may be performed without a SRA, depending on the organization's needs.
Following meticulous planning and data collection, security auditors can carry out the following activities:
The scope of the audit will determine which systems or networks are involved in the security audit.
Our SRA or SA service may not exactly follow the steps or items in the guidelines of other parties or authorities.
After completing the audit / assessment, a security audit report / assessment report will be delivered, addressing the above topics.