Loading...
Loading...
C-RECON
Assessment, discovery, and threat landscape mapping.
C-RECON is the first phase of every CDA engagement. This is where your Foundational Risk Model lives. We discover assets, map attack surfaces, assess vulnerabilities, review policies, and analyze your threat landscape. Every finding is documented, scored, and prioritized into a mission plan.
2-4 weeks
Typical duration for C-RECON phase. Actual timeline depends on organization size and scope.
19
missions in C-RECON across all six PDM domains.
C-RECON Missions
Complete discovery and classification of all data assets across the organization.
Map all data flows including ingress, egress, internal transfers, and third-party sharing.
Evaluate current data classification schemes and identify gaps in labeling and handling.
External and internal attack surface enumeration including shadow IT discovery.
Comprehensive vulnerability scanning across all network segments and applications.
Audit system configurations against CIS benchmarks and industry standards.
Establish baseline security posture score across all six PDM domains.
Complete inventory of all endpoints including BYOD and IoT devices.
Evaluate email security controls including SPF, DKIM, DMARC, and gateway configuration.
Measure current security awareness levels through simulated phishing and assessments.
Complete inventory of all identity sources, service accounts, and privileged access.
Review role assignments, permissions, and least-privilege compliance across all systems.
Evaluate authentication methods, MFA coverage, and password policies.
Industry-specific threat intelligence briefing covering relevant threat actors and TTPs.
Search dark web markets and forums for leaked credentials, data, and mentions.
Develop threat models for critical assets using STRIDE or MITRE ATT&CK frameworks.
Enterprise risk assessment identifying, analyzing, and prioritizing information security risks.
Map current controls to applicable compliance frameworks and identify gaps.
Review existing security policies for completeness, currency, and alignment with standards.
Every CDA engagement starts with RECON. Schedule your Foundational Risk Model to begin.