Industrial Red Team Tests
EPDK Regulation Compliant Penetration Testing and Security Analysis
These activities are conducted for facilities falling within the scope of regulations, based on Board Decisions No. 8560. The tests and analyses necessary for end-to-end regulation compliance are performed. Specialized teams have been focusing on these industrial facilities, ensuring full compliance with all requirements and certifications within the scope of the regulation since 2017.
The analysis includes:
- Analysis of ICS network and architectural structure
- Social engineering tests targeting personnel involved in ICS structures
- Vulnerability scanning analysis on ICS networks
- Malware analysis on ICS networks
- Testing of ICS wireless networks and components
- Exploitation testing on ICS networks
ICS Penetration Testing (Industrial Penetration Testing)
ICS Cyber Resilience Maturity Analysis
ICS Cybersecurity Hygiene Analysis Service
Product Selection and Positioning Consultancy
Secure Industrial Network and System Design Services
Asset and Risk Management Consultancy
Strategy, Policy, Procedure Consultancy Services
Industrial Security Product Support Services
Industrial Safety Operation Center Services
Industrial Cyber Incident Response Services
Services Packages
Vulnerability Scans and Penetration Testing
All services and offerings mentioned under penetration testing can be provided with the following five different packages, detailed below:
- Vulnerability Management Packages
- Automatic Vulnerability Scanning Service
- Pentest Automation
- Penetration Testing
- Red Team Testing
- MSSP (Managed Security Service Provider)
- Basic Vulnerability Management
- Advanced Vulnerability Management
Automatic Vulnerability Scanning Service: These are tests conducted using vulnerability scanning tools in a fully automated manner. The outputs generated by the tools are transmitted without any interpretation or processing. This service can also be provided through the ASV portal for external scans.
Pentest Automation: This service involves the use of vulnerability scanning tools’ outputs in conjunction with automation scripts developed by the unicons Pentest team. The service includes the transmission of reports generated using the unicons Pentest knowledge base.
Penetration Testing: It is a comprehensive penetration testing conducted by a penetration testing expert following the unicons Pentest methodology. Various tools and manual controls are applied in this process, and systems are thoroughly analyzed to generate reports. The aim of these tests is to detect as many vulnerabilities as possible in an optimal timeframe.
Red Team Testing: These are comprehensive assessments conducted by an expert team with the goal of achieving predefined targets. Activities such as developing exploits, conducting penetration attempts, and creating malware are carried out to reach the specified objectives. The tests are orchestrated like a real attacker, spread over a specific period of time.