Probe Security Headers
Check HTTP security headers across your web properties to identify missing protections like CSP, HSTS, and X-Frame-Options.
Assess third-party vendor security through identity verification, external security probing, attack surface analysis, and breach history.
Third-party vendors often have access to sensitive data or critical systems, making their security posture your security concern. A data breach at a vendor can have the same impact as a breach in your own infrastructure. Effective third-party risk assessment evaluates vendor security from the outside in without requiring privileged access.
This workflow evaluates vendor security by verifying their business identity through domain registration, probing their external security posture for misconfigurations, assessing the breadth of their attack surface, and researching their security incident history. The assessment provides an evidence-based risk score for vendor selection and ongoing monitoring.
Validate the vendor domain registration details to confirm legitimate business identity and registration history.
Probe the vendor external-facing infrastructure to evaluate their security posture including headers, TLS, and technologies.
Perform reconnaissance on the vendor infrastructure to assess the breadth of their external attack surface.
Search for past security incidents, data breaches, and security certifications associated with the vendor.