System vulnerability diagnosis
Product necessity
Checks servers, networks, databases, etc. for security conditions that may affect confidentiality, integrity, and availability.
- Identify security threats in advance through vulnerability checks and suggest countermeasures
- Identify the risk of discovered vulnerabilities, establish response strategies from a short-term/mid-term/long-term perspective, and further improve the existing security level
Check items
Linux server
Account Management
File and directory management
Service Management
patch management
Log Management
Windows server
Account Management
Service Management
Service Management
patch management
Log Management
procedure
1
Check information system status
- Identify system configuration status and operation
- Check network configuration status
- Check application system status
2
Selection of inspection target
- Prioritize information systems with high importance or high risk potential
- Similar platforms are grouped together to select a representative system.
3
Information system vulnerability diagnosis
- Vulnerability diagnosis using diagnostic tools
- Network Vulnerability Diagnostic Tool
- Server Vulnerability Diagnostic Tool
- Security equipment operation diagnosis
- Manual vulnerability inspection using inspection script
4
Diagnostic result analysis
- Analysis of reports presented by the diagnostic tool
- Result analysis by manual inspection
5
Presentation of reports and security measures
- Present improvement measures
- Propose measures to eliminate vulnerabilities found in diagnostic tools
- Present a plan to eliminate vulnerabilities discovered through manual inspection
Expected effect
Through Code One vulnerability diagnosis, we diagnose technical vulnerabilities in major information systems operated by customers and suggest protection measures for the identified risks, thereby lowering the risk of infringement incidents and improving security levels.
- Securing legal compliance for information protection, personal information protection, industrial security, information and communication infrastructure protection, etc.
- Check vulnerabilities and detect problems early according to IT infrastructure and web application characteristics
- Establish a foundation for risk management through security guides and improvement measures according to identified vulnerabilities
- Securing information security technology base through information security training and technology transfer that can be applied to actual work

