Certification In India


What is Assessment?

Assessment refers to the process of evaluating various aspects of a system, network, software, or infrastructure to determine its performance, security, reliability, and overall effectiveness. IT assessments can encompass a wide range of areas, including:

  1. Security Assessment: Evaluating the security measures and vulnerabilities within an IT system to identify potential threats and weaknesses.

  2. Risk Assessment: Identifying and analyzing potential risks to IT assets, such as data breaches, cyber attacks, or system failures, and determining strategies to mitigate these risks.

  3. Performance Assessment: Assessing the performance of hardware, software, and networks to ensure optimal operation and identify areas for improvement.

  4. Compliance Assessment: Ensuring that IT systems and practices comply with relevant laws, regulations, and industry standards, such as GDPR, HIPAA, or PCI DSS.

  5. Infrastructure Assessment: Evaluating the physical and virtual infrastructure components, such as servers, routers, and storage systems, to ensure they meet organizational requirements and support business objectives.

  6. Software Assessment: Assessing the quality, functionality, and security of software applications to ensure they meet user needs and adhere to best practices.

  7. Disaster Recovery Assessment: Evaluating the effectiveness of disaster recovery plans and procedures to ensure that IT systems can be quickly restored in the event of a disruption or disaster.

  8. IT Governance Assessment: Assessing the effectiveness of IT governance practices, policies, and procedures to ensure alignment with organizational goals and objectives.

1. Red Team Assessment

A Red Team Assessment is a type of cybersecurity assessment where a team of skilled professionals, known as the “red team,” simulates real-world cyber attacks to test the security defenses of an organization’s systems, networks, and infrastructure. Unlike traditional cybersecurity assessments, which focus on identifying vulnerabilities and weaknesses, a Red Team Assessment takes a more aggressive approach by actively attempting to exploit security flaws and penetrate the organization’s defenses.

The goal of a Red Team Assessment is to provide a realistic and comprehensive evaluation of an organization’s security posture, including its ability to detect, respond to, and mitigate cyber threats. By mimicking the tactics, techniques, and procedures (TTPs) used by malicious hackers, the red team helps identify gaps in the organization’s security controls, processes, and incident response capabilities.

2. Application Security

Application security refers to the measures and practices implemented to protect software applications from threats and vulnerabilities throughout the software development lifecycle (SDLC). It encompasses strategies, techniques, and technologies designed to ensure that applications are secure, resilient, and resistant to attacks.

Key aspects of application security include:

  1. Secure Design: Incorporating security considerations into the design phase of the software development process. This involves identifying potential security risks and implementing appropriate security controls to mitigate them.

  2. Secure Coding: Writing code in a way that minimizes vulnerabilities and weaknesses. This includes following secure coding practices, such as input validation, output encoding, and proper error handling, to prevent common security issues like injection attacks, cross-site scripting (XSS), and buffer overflows.

  3. Authentication and Authorization: Implementing mechanisms to verify the identity of users and control their access to sensitive resources within the application. This typically involves using strong authentication methods, such as multi-factor authentication (MFA), and enforcing least privilege access controls.

  4. Data Protection: Ensuring the confidentiality, integrity, and availability of data processed and stored by the application. This may involve encrypting sensitive data, securely managing keys and credentials, and implementing data loss prevention (DLP) mechanisms.

  5. Security Testing: Conducting thorough security testing throughout the SDLC to identify and remediate vulnerabilities. This includes techniques such as static analysis, dynamic analysis, and penetration testing to assess the security posture of the application and validate the effectiveness of security controls.

  6. Security Training and Awareness: Providing developers, testers, and other stakeholders with training and awareness programs to educate them about security best practices and common threats. This helps foster a security-conscious culture within the organization and promotes proactive security measures.

  7. Security Incident Response: Establishing procedures and processes to respond to security incidents and breaches effectively. This includes incident detection, analysis, containment, eradication, and recovery to minimize the impact of security incidents on the organization.

3. Mobile Security Testing

Mobile security testing refers to the process of evaluating the security of mobile applications and devices to identify vulnerabilities, weaknesses, and potential security risks. With the increasing use of mobile devices and the widespread adoption of mobile applications, ensuring the security of mobile platforms has become crucial for protecting sensitive data and preventing unauthorized access.

Key aspects of mobile security testing include:

  1. Mobile Application Security Testing (MAST): Assessing the security of mobile applications to identify vulnerabilities and weaknesses that could be exploited by attackers. This includes analyzing the application’s code, configuration settings, data storage mechanisms, and network communication protocols to uncover security flaws such as insecure data storage, improper session management, and input validation vulnerabilities.

  2. Static Analysis: Examining the source code of mobile applications to identify security issues without executing the application. Static analysis tools analyze the code for potential vulnerabilities, coding errors, and insecure coding practices, helping developers identify and fix security issues early in the development process.

  3. Dynamic Analysis: Testing the behavior of mobile applications in a runtime environment to identify security vulnerabilities and assess their impact. Dynamic analysis tools interact with the application while it is running on a mobile device or emulator, monitoring its behavior, network traffic, and system interactions to detect security flaws such as insecure data transmission, runtime manipulation, and authentication bypass vulnerabilities.

  4. Penetration Testing: Simulating real-world attacks on mobile applications and devices to identify vulnerabilities and assess their exploitability. Penetration testers use various techniques and tools to probe the application’s defenses, attempting to gain unauthorized access, escalate privileges, and manipulate sensitive data. Penetration testing helps organizations understand their security posture and prioritize remediation efforts based on the severity of identified vulnerabilities.

  5. Mobile Device Security Testing: Evaluating the security of mobile devices, including smartphones, tablets, and wearable devices, to identify configuration weaknesses, operating system vulnerabilities, and potential security risks. This may involve analyzing device settings, permissions, encryption mechanisms, and firmware updates to ensure that mobile devices are adequately protected against security threats.

  6. Security Best Practices: Assessing mobile applications and devices against established security best practices and industry standards, such as the OWASP Mobile Top 10, to ensure compliance with security guidelines and recommendations. This involves evaluating security controls, implementing secure coding practices, and adhering to security principles to mitigate common security risks and vulnerabilities.

4. SCADA and ICS

SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems) are critical components of modern industrial operations, enabling the monitoring, control, and automation of various processes in sectors such as manufacturing, energy, water treatment, and transportation.

  1. SCADA (Supervisory Control and Data Acquisition): SCADA systems are used to monitor and control industrial processes and infrastructure. They typically consist of a network of sensors, controllers, and human-machine interfaces (HMIs) that gather data from remote locations and provide operators with real-time visibility and control over industrial processes. SCADA systems help optimize operations, improve efficiency, and ensure the reliability and safety of industrial processes.

  2. ICS (Industrial Control Systems): ICS refers to a broader category of systems that includes SCADA systems along with other control systems used in industrial settings. This can include Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), and other specialized control systems. ICS are essential for controlling machinery, equipment, and processes in industries such as manufacturing, energy production, and transportation.

Both SCADA and ICS play a crucial role in managing critical infrastructure and industrial processes, but they also present unique security challenges. As these systems become increasingly interconnected and accessible over networks, they become vulnerable to cyber attacks and security breaches.

5. Telecom Security

Telecom security refers to the measures and practices implemented to protect telecommunications infrastructure, networks, and services from security threats, vulnerabilities, and attacks. With the increasing reliance on telecommunications for communication, data transmission, and connectivity, ensuring the security of telecom systems has become paramount to safeguarding sensitive information, maintaining privacy, and preserving the integrity of communication channels.

Key aspects of telecom security include:

  1. Network Security: Securing telecommunications networks against unauthorized access, data breaches, and cyber attacks. This involves implementing firewalls, intrusion detection and prevention systems (IDPS), access control mechanisms, and encryption protocols to protect network infrastructure, data traffic, and communication channels.

  2. Data Encryption: Encrypting data transmitted over telecommunications networks to prevent eavesdropping, interception, and unauthorized access. Encryption techniques such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Virtual Private Networks (VPNs) are commonly used to ensure the confidentiality and integrity of data in transit.

  3. Authentication and Authorization: Implementing strong authentication mechanisms to verify the identity of users, devices, and systems accessing telecom services. This includes using passwords, biometric authentication, multi-factor authentication (MFA), and digital certificates to ensure that only authorized entities can access telecom resources and services.

  4. Privacy Protection: Protecting the privacy of users’ communications and sensitive information transmitted over telecom networks. This involves adhering to privacy regulations and standards, such as General Data Protection Regulation (GDPR) and telecommunications privacy laws, and implementing measures to safeguard personal data against unauthorized disclosure or misuse.

  5. Denial of Service (DoS) Mitigation: Defending against DoS attacks and other forms of cyber attacks that attempt to disrupt or degrade telecom services by overwhelming network resources or exploiting vulnerabilities. This includes deploying DoS detection and mitigation tools, implementing rate limiting, and optimizing network traffic management to mitigate the impact of DoS attacks.

  6. Network Monitoring and Incident Response: Monitoring telecommunications networks for suspicious activities, anomalies, and security incidents, and responding promptly to mitigate threats and minimize the impact of security breaches. This involves deploying network monitoring tools, security information and event management (SIEM) systems, and establishing incident response procedures to detect, analyze, and mitigate security incidents effectively.

  7. Regulatory Compliance: Ensuring compliance with regulatory requirements, industry standards, and best practices related to telecom security. This includes adhering to telecommunications regulations, data protection laws, and security standards such as ISO/IEC 27001 and NIST Cybersecurity Framework to demonstrate compliance and uphold security governance principles.

6. Sharepoint Security

SharePoint security refers to the measures and practices implemented to protect SharePoint environments, data, and resources from unauthorized access, data breaches, and other security threats. SharePoint is a web-based collaboration platform developed by Microsoft, commonly used for document management, content sharing, and team collaboration within organizations. Securing SharePoint is crucial to ensuring the confidentiality, integrity, and availability of sensitive information and resources stored and shared within the platform.

Key aspects of SharePoint security include:

  1. Authentication and Authorization: Implementing authentication mechanisms to verify the identity of users accessing SharePoint sites and resources. SharePoint supports various authentication methods, including Windows authentication, forms-based authentication, and claims-based authentication. Additionally, granular authorization controls allow administrators to define user permissions and access rights based on roles, groups, and individual users, ensuring that only authorized individuals can access and interact with SharePoint content.

  2. User Access Controls: Enforcing access controls to restrict user access to sensitive SharePoint sites, libraries, folders, and documents. This includes configuring permissions at the site, list, library, and item level to control who can view, edit, upload, delete, and manage content within SharePoint. Role-based access control (RBAC) enables administrators to assign permissions based on users’ roles and responsibilities, ensuring that users have the appropriate level of access required to perform their tasks.

  3. Data Encryption: Encrypting data transmitted between clients and SharePoint servers to protect against eavesdropping and interception. SharePoint supports encryption protocols such as Secure Sockets Layer (SSL) and Transport Layer Security (TLS) to encrypt data in transit, as well as encryption at rest to protect data stored within SharePoint databases and file systems.

  4. Auditing and Logging: Enabling auditing and logging features to track user activities, changes, and access events within SharePoint. Auditing capabilities allow administrators to monitor and review user actions, document modifications, and security-related events, helping detect unauthorized access, data breaches, and compliance violations. SharePoint provides built-in audit logging features, as well as third-party auditing solutions for advanced auditing and reporting capabilities.

  5. Data Loss Prevention (DLP): Implementing data loss prevention policies and controls to prevent the unauthorized disclosure or leakage of sensitive information within SharePoint. DLP features in SharePoint enable administrators to define and enforce policies for identifying, classifying, and protecting sensitive data, such as personally identifiable information (PII), financial data, and intellectual property. DLP rules can be configured to monitor, block, or quarantine sensitive content based on predefined criteria, ensuring compliance with regulatory requirements and organizational policies.

  6. Security Updates and Patch Management: Regularly applying security updates, patches, and hotfixes to SharePoint servers and components to address known vulnerabilities and security weaknesses. Microsoft releases security updates for SharePoint as part of its regular patching cycle, and administrators should promptly apply these updates to protect SharePoint environments from exploitation by attackers.

  7. Security Training and Awareness: Providing training and awareness programs to SharePoint users, administrators, and stakeholders to educate them about security best practices, policies, and procedures. User awareness training helps promote a security-conscious culture within the organization, empowering users to recognize and respond to security threats, phishing attacks, and suspicious activities within SharePoint.

7. Network Audit

A network audit is a comprehensive examination and assessment of an organization’s computer network infrastructure, systems, and security controls. The purpose of a network audit is to evaluate the overall health, performance, and security of the network, identify vulnerabilities and weaknesses, and recommend improvements to enhance efficiency, reliability, and security.

Key aspects of a network audit include:

  1. Infrastructure Assessment: Evaluating the physical and logical components of the network, including routers, switches, servers, workstations, and other network devices. This involves assessing network topology, configuration settings, hardware specifications, and connectivity to identify any issues or bottlenecks affecting network performance and reliability.

  2. Security Audit: Reviewing the security measures and controls implemented within the network to protect against unauthorized access, data breaches, and cyber threats. This includes assessing firewall configurations, access controls, encryption protocols, intrusion detection systems (IDS), and other security mechanisms to identify vulnerabilities and ensure compliance with security best practices and regulatory requirements.

  3. Network Traffic Analysis: Analyzing network traffic patterns, protocols, and volumes to identify abnormal behavior, anomalies, and potential security incidents. This involves using network monitoring tools and packet sniffers to capture and analyze network traffic in real-time, helping detect unauthorized activities, malware infections, and data exfiltration attempts.

  4. Vulnerability Assessment: Conducting vulnerability scans and assessments to identify known security vulnerabilities, misconfigurations, and weaknesses within the network infrastructure and systems. This involves using automated vulnerability scanning tools to scan network devices, servers, and applications for known vulnerabilities and security flaws, and prioritizing remediation efforts based on the severity of identified issues.

  5. Policy and Compliance Review: Reviewing network security policies, procedures, and compliance requirements to ensure alignment with industry standards, regulatory mandates, and organizational objectives. This includes assessing the adequacy of security policies, access controls, data protection measures, and incident response procedures to mitigate security risks and ensure compliance with applicable regulations, such as GDPR, HIPAA, and PCI DSS.

  6. Documentation and Reporting: Documenting audit findings, observations, and recommendations in a comprehensive audit report. This report typically includes an executive summary, detailed assessment findings, risk analysis, remediation recommendations, and an action plan for addressing identified issues and improving network security posture. The audit report serves as a roadmap for implementing corrective actions and enhancing network security.

8. Wireless Auditing

Wireless auditing refers to the process of evaluating and assessing the security of wireless networks, devices, and protocols to identify vulnerabilities, weaknesses, and potential security risks. With the widespread adoption of wireless technologies such as Wi-Fi, Bluetooth, and cellular networks, ensuring the security of wireless communications has become essential for protecting sensitive information, preventing unauthorized access, and maintaining the integrity of network infrastructure.

Key aspects of wireless auditing include:

  1. Wireless Network Discovery: Identifying and mapping wireless networks within the vicinity using wireless scanning tools and techniques. This involves scanning for Wi-Fi access points, Bluetooth devices, and other wireless signals to create an inventory of active networks and devices, including their SSIDs, MAC addresses, signal strength, and encryption status.

  2. Wireless Security Assessment: Assessing the security posture of wireless networks by evaluating their configuration settings, encryption mechanisms, authentication methods, and access controls. This includes conducting penetration tests, vulnerability scans, and security audits to identify common security vulnerabilities and misconfigurations, such as weak passwords, outdated firmware, insecure protocols, and unauthorized access points.

  3. Wireless Intrusion Detection and Prevention: Deploying wireless intrusion detection and prevention systems (WIDS/WIPS) to monitor and protect wireless networks from unauthorized access, rogue devices, and malicious activities. WIDS/WIPS solutions analyze wireless traffic, detect suspicious behavior and anomalies, and automatically respond to security threats by blocking or mitigating unauthorized connections and attacks.

  4. Client Device Security: Assessing the security of wireless client devices, such as laptops, smartphones, and IoT devices, to ensure they are configured securely and are not vulnerable to wireless attacks. This includes verifying device encryption settings, patch levels, security configurations, and wireless connectivity behavior to mitigate risks associated with compromised or insecure devices.

  5. Wireless Authentication and Encryption: Evaluating the effectiveness of wireless authentication mechanisms and encryption protocols used to secure wireless communications. This involves assessing the strength of encryption algorithms (e.g., WPA2, WPA3), the integrity of cryptographic keys, and the robustness of authentication methods (e.g., WPA-PSK, WPA-Enterprise) to prevent unauthorized access and eavesdropping attacks.

  6. Wireless Policy and Compliance Review: Reviewing wireless security policies, procedures, and compliance requirements to ensure alignment with industry standards, regulatory mandates, and best practices. This includes assessing the adequacy of wireless security policies, user access controls, guest network management, and regulatory compliance measures (e.g., GDPR, HIPAA) to mitigate security risks and ensure compliance with applicable regulations.

9. Security Audit

A security audit is a systematic examination and assessment of an organization’s security policies, procedures, controls, and infrastructure to identify vulnerabilities, weaknesses, and potential security risks. The primary goal of a security audit is to evaluate the effectiveness of security measures and practices implemented within an organization and to identify areas for improvement to enhance security posture.

Key aspects of a security audit include:

  1. Policy and Procedure Review: Reviewing security policies, procedures, guidelines, and documentation to ensure alignment with industry standards, regulatory requirements, and organizational objectives. This involves assessing the adequacy of security policies in addressing risks, defining roles and responsibilities, and establishing guidelines for security best practices.

  2. Access Controls Assessment: Evaluating access controls and authentication mechanisms implemented within the organization to ensure the confidentiality, integrity, and availability of sensitive information and resources. This includes reviewing user account management practices, password policies, access permissions, and privilege escalation procedures to prevent unauthorized access and data breaches.

  3. Network Security Assessment: Assessing the security of network infrastructure, systems, and devices to identify vulnerabilities, misconfigurations, and potential security threats. This involves reviewing firewall configurations, network segmentation, intrusion detection/prevention systems (IDS/IPS), and network traffic analysis to detect and mitigate security risks such as unauthorized access, malware infections, and denial-of-service (DoS) attacks.

  4. Endpoint Security Review: Evaluating the security of endpoint devices, including desktops, laptops, servers, and mobile devices, to ensure they are adequately protected against security threats. This includes assessing endpoint security controls such as antivirus/antimalware software, endpoint encryption, patch management, and device management policies to mitigate risks associated with malware infections, data breaches, and unauthorized access.

  5. Data Protection and Privacy Assessment: Reviewing data protection measures and privacy controls implemented within the organization to safeguard sensitive information and comply with regulatory requirements. This includes assessing data encryption, data loss prevention (DLP) controls, data classification policies, and privacy policies to prevent unauthorized access, disclosure, or misuse of sensitive data.

  6. Incident Response Preparedness: Evaluating the organization’s incident response capabilities, procedures, and protocols to effectively detect, respond to, and recover from security incidents. This includes reviewing incident detection mechanisms, incident reporting procedures, incident response plans, and post-incident analysis to minimize the impact of security breaches and ensure timely incident response and recovery.

  7. Compliance Review: Ensuring compliance with relevant laws, regulations, and industry standards related to cybersecurity and data protection. This includes assessing compliance with standards such as ISO/IEC 27001, GDPR, HIPAA, PCI DSS, and other regulatory requirements applicable to the organization’s industry and geographic location.

10. DDoS Simulation

DDoS (Distributed Denial of Service) simulation is a controlled and simulated exercise that replicates the behavior of a DDoS attack on an organization’s network infrastructure, systems, or services. The purpose of conducting a DDoS simulation is to evaluate the organization’s readiness and resilience in mitigating and responding to DDoS attacks, as well as to identify weaknesses in its DDoS mitigation strategies and defenses.

Key aspects of a DDoS simulation include:

  1. Planning and Preparation: Planning the scope, objectives, and parameters of the DDoS simulation exercise, including the types of DDoS attacks to be simulated, the duration and intensity of the attacks, and the systems and services to be targeted. This involves defining the goals of the simulation, identifying stakeholders, and obtaining necessary approvals and resources for conducting the exercise.

  2. Simulation Execution: Executing the DDoS simulation by generating simulated DDoS traffic or using specialized DDoS simulation tools and techniques to inundate the organization’s network infrastructure, servers, or services with malicious traffic. This involves simulating various types of DDoS attacks, such as volumetric attacks (e.g., UDP flood, ICMP flood), application layer attacks (e.g., HTTP flood, SYN flood), and protocol-based attacks (e.g., DNS amplification), to assess the organization’s ability to withstand and mitigate different attack scenarios.

  3. Monitoring and Analysis: Monitoring the organization’s network traffic, systems, and services during the DDoS simulation to assess the impact of the simulated attacks, identify bottlenecks, and evaluate the effectiveness of DDoS mitigation measures and defenses. This involves analyzing network performance metrics, system logs, and security alerts to detect anomalies, identify attack patterns, and determine the effectiveness of mitigation techniques such as rate limiting, traffic filtering, and cloud-based DDoS protection services.

  4. Incident Response and Mitigation: Activating incident response procedures and mitigation strategies to mitigate the impact of the simulated DDoS attacks and restore normal operations. This involves coordinating with internal teams, external vendors, and internet service providers (ISPs) to implement countermeasures, reroute traffic, and mitigate the effects of the DDoS attacks on critical systems and services. Incident response activities may include deploying additional bandwidth, activating DDoS scrubbing services, or implementing blackhole routing to mitigate the impact of the attacks.

  5. Post-Simulation Analysis: Conducting a post-simulation analysis to evaluate the organization’s performance in responding to the simulated DDoS attacks, identify lessons learned, and recommend improvements to enhance DDoS resilience and preparedness. This involves documenting observations, findings, and recommendations from the simulation exercise, as well as updating incident response plans, security policies, and mitigation strategies based on the insights gained.

11. Spear Phishing

Spear phishing is a targeted form of phishing attack in which cybercriminals customize their fraudulent emails or messages to trick specific individuals or organizations into revealing sensitive information, such as login credentials, financial data, or personal information. Unlike traditional phishing attacks that cast a wide net and aim to deceive a large number of recipients, spear phishing attacks are highly tailored and personalized, often exploiting information obtained through social engineering or reconnaissance to increase their credibility and effectiveness.

Key characteristics of spear phishing include:

  1. Targeted Approach: Spear phishing attacks target specific individuals or groups within an organization, such as executives, employees, or customers, based on their roles, relationships, or affiliations. Cybercriminals research their targets and use personalized information, such as names, job titles, or organizational affiliations, to craft convincing and credible phishing messages.

  2. Social Engineering Techniques: Spear phishing attacks often leverage social engineering techniques to manipulate targets into taking action, such as clicking on malicious links, downloading infected attachments, or divulging sensitive information. Common tactics used in spear phishing include impersonating trusted senders, creating urgency or fear, and exploiting familiarity or rapport to establish trust with the target.

  3. Spoofed Identities: Cybercriminals often spoof the identities of trusted individuals or organizations, such as colleagues, supervisors, or reputable companies, to deceive targets into believing that the phishing emails or messages are legitimate. This may involve using forged email addresses, domain names, or branding elements to mimic legitimate sources and evade detection.

  4. Tailored Content: Spear phishing emails and messages contain content that is specifically crafted to resonate with the targeted individuals or organizations. The content may reference specific events, projects, or personal information obtained through reconnaissance to make the phishing messages appear more authentic and convincing. Additionally, spear phishing messages may contain compelling calls to action, such as requesting urgent assistance, confirming account details, or downloading important documents, to prompt targets to respond without suspicion.

  5. Payload Delivery: Spear phishing attacks often deliver malicious payloads, such as malware, ransomware, or credential theft tools, to compromise the target’s device or network. Malicious links or attachments embedded in spear phishing emails may lead to phishing websites, exploit kits, or malware downloads designed to exploit vulnerabilities and gain unauthorized access to sensitive information or systems.

  6. Stealth and Persistence: Spear phishing attacks are designed to evade detection by traditional security measures, such as spam filters or antivirus software, by using sophisticated obfuscation techniques, encryption methods, or polymorphic malware variants.

What is the Role of Shamkris?



Scope Review

Scope Statements


Methodology Use

Resource Identification

Deployment of Resources Technical Tools & Manpower

Inspection / Verification or Assessment

Report and Closure of non-compliance

Plant Review of Scope

Scope Amendment

Annual Support

Monthly / Quarterly / Half Year / Yearly

Issuing Authority

Approved Agency
Approved CB