A comprehensive security assessment was conducted by a security consulting firm.
The consultants conducted:
- Configuration reviews of hosting servers
- Configuration reviews of network appliances
- Vulnerability scans of Hosting Server OS
- Web Interface tests
- Checks for OWASP top 10 issues and others, including Code Injection, Privilege escalation, and horizontal account movement
- Tests of ARALOC Viewers - traffic capture, code review, decompile and process analysis.