Threat Landscape Assessment (TLA)

Our Threat Landscape Assessments (TLA) provides a very good look into your organization's security posture, attack surface and exposed assets.

Our experienced open-source intelligence (OSINT) and network scanning specialists conduct a fast paced and effective scan of the internet after traces of your organization and write an extensive report on any issues or interesting artifacts found.

Assured performs external asset discovery and uses readily available information gathering methodologies such as:

  • Information gathering and internet presence identification through Open Source Intelligence (OSINT)
  • Passive and active domain discovery
  • IP/Net block mapping & identification of suppliers
  • Passive service enumeration and targeted scanning
  • Web service fingerprinting, analysis and information leakage identification
  • Vulnerability analysis of identified services

The TLA provides you with a current view of your digital footprint, as seen from an attacker's perspective, and can act as a basis for future security engagements on the most valuable parts of your infrastructure.

A Threat Landscape Assessment (TLA) is quick, effective and a great initial test. Many of our clients also ask us to perform this assessment on a regular basis.

Read answers to common questions below and contact us if you have further questions about a Threat Landscape Assessment (TLA).

Frequently Asked Questions

  • A Threat Landscape Assessment (TLA) is a brief, non-intrusive security assessment of an organization's external assets and attack surface.

  • To identify the organization's attack surface and common vulnerabilities that an attacker could abuse to gain access to its resources.

  • A TLA contains the following stages: domain and asset discovery; general information gathering (documents, employee emails, third-party services and vendors); passive and active service enumeration; vulnerability assessment; and finally, communicating findings in a comprehensive report.

  • Organizations and IT environments change frequently. It is common to perform a TLA as an initial test to get insight into what exactly you have online. Based on the results a penetration test might be of interest or a configuration audit of certain systems. It could be performed periodically to monitor changes in the environment or executed when major changes have been implemented.

  • You will get a written report and a presentation detailing the issues and observations identified during the assessment as well as a list of recommendations with indication of priority. In almost every assessment we identify assets that need further testing or auditing.