You don't always know
if you've been breached.
The average time between initial compromise and detection is months. A Compromise Assessment investigates whether there is currently, or has recently been, unauthorised access to your environment.
What is a Compromise Assessment?
A Compromise Assessment is an investigation to determine whether your environment has been compromised, currently or historically. The team searches for indicators of compromise across endpoints, network traffic, logs, Active Directory and cloud. This goes beyond a vulnerability scan: it looks for evidence of actual attacker activity, combining automated scanning with expert manual threat hunting.
Find what is already there
The team searches targeted for indicators of compromise: suspicious files, unknown processes, unusual network connections, log manipulation, lateral movement and persistence mechanisms. This goes further than a vulnerability scan: it searches for evidence of actual attacker activity.
A Compromise Assessment is relevant after a merger or acquisition (is the environment you are integrating clean?), after a supplier incident (were we also affected?), or simply as a periodic health check of your environment.
The team combines automated scanning with manual threat hunting. Automated tools scan broadly for known indicators. Manual analysis searches for subtler traces that tools miss.
Attackers dwell for months before you notice
-
The average dwell time is measured in months, not hours
Sophisticated attackers move slowly and quietly. They establish persistence, map your environment and wait for the right moment. Without active investigation, you may not know for months.
-
M&A introduces unknown risk into your environment
When integrating acquired environments, you inherit their security posture. A Compromise Assessment before integration prevents importing an active threat into your network.
-
Supplier incidents frequently affect downstream organisations
Supply chain attacks target multiple organisations through a single compromised supplier. When a key supplier is breached, you need to know whether your environment was also affected.
What we investigate
How we investigate your environment
Scoping
Environment, time period, trigger and priorities. Defining what is in scope and what detection depth is required.
Data collection
Deployment of forensic tooling, log extraction and network monitoring. Minimal operational footprint.
Automated analysis
Broad scan for known IoCs and anomalies. Baseline deviation analysis across endpoints, logs and network.
Manual threat hunting
Targeted search for subtle indicators of compromise. Expert hunters look for what automated tools miss.
Reporting
Findings, risk assessment and recommendations. If compromise is found, immediate transition to incident response.
Deliverables
- Compromise Assessment report
- Findings with risk classification
- Indicators of compromise (if found)
- Recommendations for remediation and monitoring
- Executive summary
- Immediate escalation to incident response if active compromise is detected
When to run a Compromise Assessment
Organisations after a merger or acquisition
Before integrating an acquired environment, validate that it is clean. Do not import a threat into your network.
Companies after a supplier or partner incident
When a key supplier is breached, determine whether your environment was also affected. Supply chain attacks are designed to propagate.
Organisations wanting periodic validation
Regular Compromise Assessments provide confidence that your environment is clean and your controls are effective.
Companies starting a new security programme
Establish a clean baseline before investing in new security measures. Know what you are starting from.
Vendor-agnostic by design
DEFION works with the tooling you already have, or brings ours. No vendor lock-in.
FAQ
How does a Compromise Assessment differ from a pentest?
How long does a Compromise Assessment take?
What happens if something is found?
Is this disruptive to our operations?
How often should a Compromise Assessment be performed?
Know whether your environment is clean.
Request a Compromise Assessment. Confidence in your environment, or early detection of what needs to be addressed.
®