Zero Trust Assessments
Zero Trust Baseline Signal Review
4 weeks · Hybrid workshops and remote analysis
We interview security and platform owners, trace authentication paths, and document where implicit trust still exists. Deliverables include a prioritized control backlog, a vendor-neutral architecture sketch, and an executive summary that translates findings into board-ready language.
₩8,200,000 (KRW)
Request scoping notes
Included focus areas
- Identity path mapping across IdP, VPN, and SaaS entry points
- Microsegmentation readiness checklist with VLAN and cloud equivalents
- Device inventory trust scoring against CIS-aligned baselines
- Executive narrative with risk-ranked findings
- Workshop readout with engineering and GRC stakeholders
- Optional purple-team tabletop for lateral movement scenarios
- Handoff templates for procurement and architecture forums
Outcomes
- A single authoritative view of trust boundaries as they exist today
- A phased remediation map aligned to capex and staffing reality
- Clear ownership lines between infrastructure, identity, and applications
FAQ
Do you need direct administrative access to our IdP?
We prefer read-only exports and guided walkthroughs. Full admin rights are not required for the baseline review.
What if our documentation is incomplete?
We work from interviews and live observations. Gaps are noted explicitly and become part of the remediation backlog.
Is remediation implementation included?
No. This package produces the roadmap and evidence pack. Implementation is scoped separately to avoid hidden overlap.
Experience notes
The authentication path diagrams finally matched what our operators actually saw during incidents. The limitation section on legacy mainframe access was blunt and useful.
We appreciated that they never pushed a single vendor during the readout. The backlog was ordered by blast radius, not logo size.