Vulnerability Assessment is the detailed examination of IT system and infrastructure configurations to determine their security posture, find and document vulnerabilities and produce recommendations to enhance security.
- Perimeter - Assess border systems such as firewalls, external security systems, routers, switches and hosts on the Internet-facing portions of the client's network, in inter-organizational DMZs and partner-facing networks. The assessment examines the configurations of the target systems and services visible from outside the organization. The assessment may also include hosts available through dial-up (modem) access.
- Internal - Assess internal servers, network infrastructure, security systems and standard client host builds. The assessment may also assess systems in DMZs from an internal perspective.