Laserfiche WebLink
. -, - C o rn p u N et, Inc. City of Everett <br /> Application Security Assessment <br /> discuss the assessment's scope, including the specific scanning details to be performed. The CIS (Center <br /> for Internet Security) Control 18 - Application Security around scanning types, software development <br /> implications, 3rd Party application considerations, knowledge and training, and industry standards for <br /> hardening databases. <br /> Architectural conversations take place to understand application delivery, best practices, firewall details, <br /> and the application-hosting environment (Cloud, On-Prem, Both). Business Requirement conversations <br /> then take place to get an understanding of critical applications, business impact potential, and risk <br /> mitigation recommendations <br /> CompuNet will then perform discovery and authenticated scans of the Web Site Base URL via a remote <br /> web application. The scans will focus on the websites and applications identified during the Discovery <br /> Workshop. The Scans will then be analyzed and compiled for inclusion into CompuNet's Assessment <br /> document, including detailed results, recommendations, and actionable next steps. <br /> Location <br /> All work will be completed remotely. <br /> Engagement Timeline <br /> Project duration is expected to take 4 weeks. Project start date will be agreed upon in advance by both <br /> Customer and CompuNet. Work schedule will be driven by the schedules and availability of critical <br /> personnel. <br /> SERVICE & DELIVERABLES <br /> Phase 1: Discovery Phase <br /> • Kickoff <br /> • Logistical Discovery <br /> • Schedules <br /> • Communication <br /> • Stakeholders <br /> • Site Details - Prerequisites - Interviews <br /> • Planned Sites and Scans <br /> • Architecture review Business Requirements <br /> • Application Prioritization <br /> • Interview of CIS Control 18 <br /> SOW# 102295 - Revision #1 <br /> Seattle, WA I (206) 456-9133 <br /> www.compunet,biz <br /> Th,s document is PROPRIETARY and SENSITIVE and may not be duplicated redistributed or displayed to any other party without the <br /> expressed written permission of CompuNet, Inc. An automatic exception is granted to public entities. <br />