CybrHawk Blue Team

Security Assessment

CybrHawk Blue Team Testing Stages

  • Preparedness

  • Identification

  • Endurance

  • Elimination

  • Recovery

CybrHawk Blue Team Overview

Z

Perimeter Defense

The blue team must always be aware of the boundaries of the network, including traffic flow, packet filtering, proxy firewalls and detection systems for intrusion
Z

Operating System Hardening

The blue team will conduct hardening procedures on all operating systems throughout the enterprise in preparation for a computer security event.
Z

Tools

Blue Teams use a wide range of tools to detect an intrusion, gather forensic information, analyze data, and make changes to deter future attacks and mitigate threats.

Objectives

Detecting and avoiding security checks

Proactive & Reactive Approach

Enhance Security Standards

Security Awareness training

Secure Policy Settings

Two Factor Authentication

Bitnami