Cybersecurity Health Check Services

A detailed list of the services offered by the Cybersecurity Health Check Program. Please refer to this page when submitting an application.

Vulnerability Scans and Assessments

#Service NameService Description
1AD Hygiene and Asset Report CardAnalyzes Active Directory structure for weaknesses and security flaws. Provides AD hardening review, asset detail report, security report card and a hardware lifecycle review.
2Database Vulnerability AssessmentConducts a credentialed scan of a selected database to identify potential security issues.
3External Vulnerability ScanScan performed outside network perimeter to evaluate for vulnerabilities and weaknesses from the perspective of someone without network access.
4Internal Vulnerability ScanScans a range of IPs for open ports, patch status, weak passwords, encryption protocols, and application/OS versions and vulnerabilities.
5Wireless Network Vulnerability ScanIdentifies wireless devices by SSID providing information on type of device, MAC address, GPS location and security protocols/encryption standards utilized.

Process, Policy, and Procedural Assessments

#Service NameService Description
6Access Control Policies/ProceduresHelps organizations design, create & document access control policies based on best practice standards.
7Backup and Recovery Strategy AssessmentDiscussion of backup and recovery procedures to examine for completeness, feasibility and weaknesses.
8Business Impact Analysis (BIA) System SecurityHelps an organization create a BIA, listing and prioritizing mission critical systems, identifying resource requirements and priorities during recovery.  If an organization already has a BIA developed this service will evaluate it for gaps and provide feedback.
9Cybersecurity Policy SupportProvides organizations with templates and best practice guidance in creating three IT-related policies.
10Disaster Recovery Plan CreationHelps an organization create a disaster recovery plan based on best practice guidelines and organization-specific details including recovery/backup solutions, staffing, testing and more.
11Disaster Recovery Plan ReviewReview to assess how capable the organization is to restore IT infrastructure functionality and access to critical data based on current Disaster Recovery Plan. Service can only be requested following completion of a Disaster Recovery Plan Creation service or upon demonstration of a completed DR plan.
12Foundational AssessmentProvides a 360-degree overview of all aspects of the existing IT program structure following the NIST CSF 2.0 framework. Provides information about areas of program strength and opportunities for improvement, and is useful in priority setting.
13IT Asset InventoryProvides template and assistance in creating asset inventory, including naming schema and asset identification.
14IT Asset Management (ITAM)Evaluates whether the organization’s assets are accounted for, deployed, maintained, upgraded, and/or disposed of. Service can only be requested following completion of an IT asset inventory service or upon demonstration of a completed IT asset inventory.
15Log Audit Monitoring AssessmentEvaluates system log audit procedures for completeness. Discusses organizational approach to storage, review and use of logs both routinely and in cybersecurity events.
16Recommendations and Remediation PlanProvide recommendations as well as a remediation plan to bring a system up to requirements or suggested levels of security and compliance.

General Services

#Service NameService Description
17Cloud Readiness AssessmentAssists organization in evaluating if an on-prem solution is ready to be migrated to the cloud, including gaps and process changes to address.
18Cloud Security AssessmentReviews configuration, access controls, MFA, user accounts and other elements of MS365 or other SaaS platforms.
19Data Breach & PII Liability Summary ReportIdentifies location of all PII across the network, along with an estimated monetary value in the event of a breach.  Determines AV and patch status of devices housing PII.
20Data Loss Prevention AssessmentDetermines if locations of sensitive data are covered by DLP software and tests its functionality.  Service can only be requested following completion of a Data breach and PII liability summary report.
21Data Security ReviewReviews the effectiveness and efficiency of existing data security processes.
22Email Encryption AssessmentTests for existing email encryption and reports on effectiveness of current solution in place.
23Endpoint Security AssessmentEvaluates configuration and pervasiveness of existing EDR solution and determines weaknesses.
24Firewall Configuration ReviewReviews current configuration of one firewall for alignment with best practices to minimize attack surface and exposure.
25G-Suite Security AssessmentIdentifies G Suite security features and application settings for administrator accounts that deviate from security best practices, as defined by Google. Produces a report with actionable remediation recommendations with risk analysis.
26LAN, WAN, VPN, and Remote Access ReviewReviews your current infrastructure, network, and remote access for possible issues.
27Network Assessment ReportThis report provides an overview of critical information with various areas of the network, providing a detailed asset inventory summarizing the current status of the network.
28Vendor Risk ManagementAssesses vendor risk profile for a cloud provider via an external vulnerability scan of the vendor network.
29Whole-Disk Encryption AssessmentReviews all machines for whole disk encryption to ensure it is installed, enabled and working as expected.

Contact

Fax

(617) 626-4411

Address

McCormack Building - Main Office
1 Ashburton Place, 8th Floor, Boston, MA 02108

Help Us Improve Mass.gov  with your feedback

Please do not include personal or contact information.
Feedback