Skip to content
> 0xD235873B | COMP_0
> 0xDA3AA5CF | COMP_1
> 0x449DE6AA | COMP_2
> 0x35545414 | COMP_3
> 0x7FAF43B3 | COMP_4
> 0x2554EF11 | COMP_5
> 0x28AB97C9 | COMP_6
> 0xE25F3087 | COMP_7
> 0xF8D011A7 | COMP_8
> 0x3682C5BF | COMP_9
> 0x4EF94100 | COMP_10
> 0x918332AF | COMP_11
> 0xC1679316 | COMP_12
> 0x47114583 | COMP_13
> 0x3AC486E7 | COMP_14
> 0xE62F7CF2 | COMP_15
> 0x6878743C | COMP_16
> 0xC06009E3 | COMP_17
> 0x5F2C3B1E | COMP_18
> 0x85CEAE85 | COMP_19

ECQ provides compromise assessment service through evaluation of a client's environment to determine if they have been compromised and to identify the extent of the breach. The following explains the steps involved in a compromise assessment service.

ECQ delivers a compromise assessment service that not only identifies and addresses existing compromises but also helps the client improve their overall security posture and reduce the risk of future breaches.

Compromise Assessment Background
1Initial Consultation and Scoping
2Data Collection and Analysis
3Preparation and Planning
4Incident Validation and Containment
5Security
6Reporting and Documentation
7Post-Assessment Support and Monitoring
Step01/07
Initial Consultation and Scoping

Meet with the client to understand their concerns and the extent of the suspected compromise.

Gather information about the client's infrastructure, including network diagrams, asset inventories, and access controls.

Define the scope of the assessment, including systems, networks, and data repositories to be examined.