FSTEK · FSB · ISO 27001 · 152-FZ

Security Audit: We Find Vulnerabilities Before Attackers Do

Pentest, 152-FZ and 187-FZ compliance analysis, preparation for FSTEK and FSB inspections. Get a report that the director understands, and a remediation plan that the engineer can execute.

Order an audit

Types of information security audit

5–14 days

Penetration Testing

We simulate a real cyberattack: find intrusion vectors before attackers do. External and internal pentest, social engineering.

7–10 days

Compliance Audit (152-FZ)

We verify organisational and technical personal data protection measures. Identify violations that could lead to Roskomnadzor fines.

10–21 days

ISO 27001 Audit

We assess the information security management system against the international standard. We help prepare for certification.

14–30 days

CII Audit (187-FZ)

Categorisation of critical infrastructure objects, protection assessment, preparation for GosSOPKA interaction.

How the audit works: 6 stages

01

Preliminary analysis

We study the organisation structure, define the audit scope, agree on methodology and timeframes.

02

Data collection

We analyse configurations, network topology, access rights, event logs and applied security tools.

03

Active checks

Vulnerability scanning, penetration testing, social engineering resistance verification.

04

Analysis & report

We prepare two reports: technical — for IT team, executive — for management with priorities and risks.

05

Remediation

We help close identified issues: from equipment configuration to staff training.

06

Re-verification

We verify results after remediation. We confirm vulnerabilities are actually closed.