{"id":971,"date":"2023-04-11T16:12:08","date_gmt":"2023-04-11T14:12:08","guid":{"rendered":"https:\/\/traptech.pl\/produkt\/configuration\/"},"modified":"2023-08-24T20:37:13","modified_gmt":"2023-08-24T18:37:13","slug":"implementation","status":"publish","type":"product","link":"https:\/\/traptech.pl\/en\/product\/implementation\/","title":{"rendered":"Implementation"},"content":{"rendered":"<p>Implementation consists of the following stages:<\/p>\n<ul>\n<li>Discussion of threat modeling\n<ul>\n<li>Identification of significant assets in the organization that need protection. They are classified according to their importance and value.<\/li>\n<li>Profile analysis of potential attackers. Objectives, resources, motivations, technical skills and available tools are taken into account.<\/li>\n<li>Attack surface survey. Review of weaknesses and potential vulnerabilities.<\/li>\n<\/ul>\n<\/li>\n<li>Create attack scenarios in the form of traps and decoys\n<ul>\n<li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">The scenario is valuable from the attacker&#8217;s point of view and could lead to a critical security breach.<\/span><\/li>\n<li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">The bait is easy for an attacker to find using post-exploitation tools.<\/span><\/li>\n<li style=\"font-weight: 300;\" aria-level=\"1\"><span style=\"font-weight: 300;\">The trap must not turn out to be a false resource too soon to give attackers time to concentrate on it.<\/span><\/li>\n<\/ul>\n<\/li>\n<li>Prepare the runtime environment in the customer environment.<\/li>\n<li><span style=\"font-weight: 300;\">Installation <\/span><b>Honeypot platform<\/b><span style=\"font-weight: 300;\"> and placing the created traps in the client environment.<\/span><\/li>\n<li><span style=\"font-weight: 300;\">Configuration of notifications with the help of additional communication channels Mail, SMS, Syslog (SIEM) in the client environment.<\/span><\/li>\n<li><span style=\"font-weight: 300;\">Develop scripts to automate the creation of decoys <\/span><span style=\"font-weight: 300;\">on workstations and servers in a client environment.<\/span><\/li>\n<\/ul>\n<p>We also offer deployment in the CyberDeception as a Service model, where the platform and traps are maintained in the TrapTech cloud. Then the work in the customer environment is limited to the last point only.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Write for details<\/p>\n[contact-form-7 id=\"106\" title=\"Contact Form\"]\n","protected":false},"featured_media":1483,"template":"","meta":[],"product_cat":[66],"product_tag":[],"class_list":["post-971","product","type-product","status-publish","has-post-thumbnail","hentry","product_cat-services"],"acf":[],"_links":{"self":[{"href":"https:\/\/traptech.pl\/en\/wp-json\/wp\/v2\/product\/971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/traptech.pl\/en\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/traptech.pl\/en\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/traptech.pl\/en\/wp-json\/wp\/v2\/media\/1483"}],"wp:attachment":[{"href":"https:\/\/traptech.pl\/en\/wp-json\/wp\/v2\/media?parent=971"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/traptech.pl\/en\/wp-json\/wp\/v2\/product_cat?post=971"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/traptech.pl\/en\/wp-json\/wp\/v2\/product_tag?post=971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}