Security Policy Management
ThreatNG's DarcRadar policy management hub enables organizations to establish, implement, and maintain security policies for their external attack surface. DarcRadar allows users to create custom policies that define the organization's risk tolerance and security requirements, covering various aspects of the external attack surface, such as acceptable levels of BEC and phishing susceptibility, brand damage susceptibility, and data leak susceptibility.
Establish and implement security policies: DarcRadar allows users to create custom policies that define the organization's risk tolerance and security requirements. These policies can cover various aspects of the external attack surface, such as acceptable BEC and phishing susceptibility, brand damage susceptibility, data leak susceptibility, and more. Once defined, ThreatNG's continuous monitoring and assessment capabilities can enforce these policies, alerting users of any violations or deviations from the established policies.
Evaluate adherence to security policies: ThreatNG's assessment capabilities, combined with the customizable risk configuration and scoring in DarcRadar, would enable organizations to assess their compliance with the defined security policies. By continuously monitoring the external attack surface and evaluating it against the established risk thresholds, ThreatNG could generate reports and alerts highlighting any non-compliance areas.
Detect and resolve policy violations: ThreatNG's continuous monitoring and reporting capabilities would identify any breaches of the defined security policies. For example, if an organization's policy states that no exposed API keys should be found in public code repositories, ThreatNG would alert the security team if any such keys are discovered. The platform could also provide recommendations for remediating these policy violations, such as revoking the exposed keys or implementing stricter access controls.