We use cookies to enhance your experience of our website, save your preferences and provide us with information on how you use our website. For more information please read our Privacy Policy. By using our website without changing your browser settings you consent to our use of cookies.

Cloud threat modeling engagement helps top financial institution mitigate risk

Certus Cybersecurity was engaged by one of the largest banks in the world by assets to deliver threat modeling services to mitigate risk. 1 minute read

At a Glance: Certus Cybersecurity was engaged by one of the largest banks in the world to execute threat modeling exercises for parts of their infrastructure.

Services Provided

Certus Cybersecurity provides the services of its employees to execute threat modeling exercises. The scope of the assessment encompassed various cloud and onsite environments and application services. As a result, three kinds of threat models were produced during the engagement:

  • The base threat models were built from scratch for existing services, environments, and applications.
  • The differential threat model was created based on previous threat modeling work, which required adjustments due to changes in the initial scope.
  • The blueprint threat model was built from scratch for services and components used in various applications and architectures across the company’s technological environment.

Results

  • Identification of various high severity threats in cloud components leveraged by multiple applications across the internal and external facing environment.
  • Identification of architectural, configuration, and implementation flaws for different applications and services.
  • Recommendation of proper mitigation steps to minimize the exploitation risk or every identified threat scenario.
  • Generation of blueprint threat models leveraged by the security team for any threat model being made containing associated components.

Other Services
Software Security
Software Security
We provide software security services, including penetration testing, secure code review, and threat modeling.
Read more
Cloud Security
Cloud Security
We help organizations improve their cloud security posture and align to security best practice by identifying weak or missing security controls and misconfigurations.
Read more
Hardware Security
Hardware Security
We secure hardware technologies through services such as threat modeling, secure code review, and penetration testing.
Read more
Cryptography
Cryptography
We have specialized expertise to uncover cryptographic vulnerabilities and maintain the confidentiality, integrity, and authenticity of sensitive information.
Read more
Litigation Consulting
Litigation Consulting
We provide attorneys with highly effective consulting and expert testimony in litigation matters involving cybersecurity. Our consultants use their technical expertise and communication skills to bring clarity to complex cybersecurity issues.
Read more
Selected Case Studies
Penetration testing helps Fortune 100 technology company enhance product security
Hardware Security Penetration testing helps Fortune 100 technology company enhance product security
 
Application security testing boosts leading retailer’s security maturity
Software Security Application security testing boosts leading retailer’s security maturity
Contact Us
Ready to get started? Book a free consultation today, and we’ll write you back within 24 hours. For further inquiries, please submit the form at right. By submitting completed “Book a Free Consultation” form, your personal data will be processed by Certus Cybersecurity. Please read our Privacy Notice for more information.