SERVICES

CYBER SECURITY CONSULTANCY

Considering the types and vectors of cyber-attacks affected by the rapidly changing dynamics of the digital world, institutions and organizations should adopt a predictive approach to their current situation against possible attacks and take strong steps towards improvement. Knowing in advance the cyber resilience and resilience posture of the institutional and organizational structures is the most critical step to be taken to identify and eliminate potential vulnerabilities.

Cyber Maturity Level Assessment Service

Determining the level of cyber maturity increases the power of institutions and organizations to take measures against possible attacks. As HAVELSAN, thanks to our expert staff and the cyber maturity level assesment roof structure we have developed, we ensure that the overall picture is drawn quickly and effectively. We are active in identifying areas requiring improvement at the detail level. The main objectives of our high-quality service are as follows:

  • To reveal existing cyber security vulnerabilities,
  • Providing our customers with opportunities for improvement in the right areas,
  • To support our customers to accurately plan their expenditures in the field of cyber security,
  • To establish a system for corporate management to manage the cyber security environment in a more standardized manner.

The main structure of our survey study, which is necessary to determine the maturity level, is based on Personal Data Protection Law (KVKK) No. 6698 Digital Transformation Office of the Presidency of Türkiye Information and Communication Security Guide, ISO 27001, ISO 27002, NIST.SP.800-53, CIS Control standard and framework documents. In addition, it has been created to include controls designed by our expert team according to customer needs and controls from other standards and frameworks other than these standards. Our unique question list is created individually for each customer, considering customer needs and contractual obligations.

Siber Olgunluk En

Cyber Security Architecture Consultancy

Cyber security architecture is a framework that covers the security controls, processes and policies necessary to meet an organization’s cyber security needs and protect its information assets. Having a strong cyber security in the information technology environment, which is increasingly turning into a complex and integrated form with the effect of today's conditions, requires the construction of a strong security architecture.

As HAVELSAN, we evaluate the information technology infrastructure of our customers with a Zero Trust perspective. In meeting the security needs; we carry out the analysis and design process in accordance with the confidentiality, integrity and accessibility structure of the data by considering Mitre Attack Framework tactics and techniques. We strategically design requirements for securing data and resources wherever they are, addressing all components of devices, people, data, networks, workload, automation, management, visibility and analytics. With a multi-layered and holistic approach, we perform the following analyses and assessments in accordance with business objectives and risk management profiles.

  • Current Situation Analysis
  • Analyzing Application Points
  • Risk Analysis and Assessment
  • Determination of Data, Application, Infrastructure and Process Requirements
  • Gap Analysis and Reporting
  • Operational Efficiency Analysis

We carry out Cyber Security Architecture Design within the framework of ISO/IEC 27001, NIST SP 800-53, FIPS, GDPR, PCI DSS, standards and the Presidential Information and Communication Security Guide.

In specialized areas:

  • Cyber Security Architecture Design and Implementation for Industrial Control Systems According to ISA/IEC 62443-2-1, NIST SP 800-82, ANSI/ISA Standards
  • Cyber Security Architecture Design and Implementation for Military Platforms

Cloud Security Consultancy

Cloud security encompasses a set of procedures, policies and technologies that harden cloud computing environments against potential cyber security threats. The main purpose of cloud security is to protect the confidentiality, integrity and accessibility of information stored, processed and transferred in cloud computing environments. At the same time, cloud security is seen as a shared responsibility between the cloud provider and the customer.

Cloud providers offer a range of security services to protect cloud environments. These services can be listed as follows:

  • Infrastructure security:
    Security services used to protect cloud infrastructure, physical and virtual resources.
  • Data security:
    Security services used to protect data stored, processed and transferred in cloud environments.
  • Application security:
    Security services used to protect applications running in cloud environments.
  • Identity and access management:
    Security services used to provide access control to cloud environments.
  • Security monitoring and
    incident response:

    Security services used in the detection, analysis and response to security incidents occurring in cloud environments.

Cloud customers are also responsible for taking their own cloud security measures. These measures can be listed as follows:

  • Risk assessment: It is an assessment to identify the security risks of cloud environments and to take necessary measures against these risks.
  • Asset management:It is a process for identifying, classifying, protecting and determining the necessary controls for information assets in cloud environments.

Cloud security is critical to protect corporate information assets. Cloud customers should work with their cloud providers to take the necessary measures to protect their cloud environments against potential cyber security threats. As HAVELSAN, we design and implement cloud security architecture for cloud providers and cloud customers in accordance with international standards such as CSA CCM, ISO 27001, ISO 27017 and ISO 27018.

Information Security Management System Consultancy

We provide consultancy, training and testing services required by organizations at all stages of Information Security Management System (ISMS) installation and operation processes, ranging from the determination of the scope to the warranty and maintenance period after certification, and offer turnkey solutions in the field of ISMS.

ISMS consultancy services we offer for the needs of our customers:

  • Preliminary Analysis and Scoping
  • ISMS Planning and Scope Determination
  • ISMS Inventory Determination and Classification
  • ISMS Risk Analysis and Assessment
  • Penetration Testing and Security Control
  • ISMS Certification
  • ISMS Training and Implementation
  • ISMS Documents
  • Warranty and Maintenance

Bilgi ve İletişim Güvenliği Rehberi Uyum Hizmeti

Cumhurbaşkanlığı Dijital Dönüşüm Ofisi Başkanlığı tarafından hazırlanan Bilgi ve İletişim Güvenliği Rehberi, kamu kurum ve kuruluşları ile kritik altyapı hizmeti veren işletmelerin uyması gereken tedbirleri içermektedir. HAVELSAN olarak kamu kurum ve kuruluşları ve kritik altyapı hizmeti veren işletmelere sunduğumuz danışmanlık hizmeti kapsamında, rehbere uyumluluk süreçlerinin denetimini uzman kadromuzla gerçekleştirmekteyiz.

Sunduğumuz nitelikli hizmetimiz; aşağıda belirtilen ana proje safhalarını kapsamaktadır.

  • Varlık Gruplarının ve Kritiklik Derecelerinin Belirlenmesi
  • Mevcut Durum ve Boşluk Analizi
  • Rehber Uygulama Yol Haritasının Hazırlanması
  • Varlık Gruplarına, Uygulama ve Teknoloji Alanlarına Yönelik Güvenlik/ Sıkılaştırma Tedbirlerinin Seviye Bazlı Uygulanması
  • Rehber Uygulama Yol Haritasının İzlenmesi ve Kontrol Edilmesi
  • Bilgi ve İletişim Güvenliği Denetiminin Yapılması
  • Değişiklik Yönetimi

HAVELSAN olarak varlık gruplarının belirlenmesi, yılda en az bir kez olmak üzere iç denetim yolu ile gerçekleştirilecek olan Bilgi ve İletişim Güvenliği Denetimi’nin yapılması, rehbere uyum sürecinin her aşaması dahil olmak üzere; özellikle tedbirlerin uygulanmasına yönelik kurumlar tarafından ihtiyaç duyulan ürün, danışmanlık, eğitim ve test hizmetlerinin sağlanması konularında çözüm ortaklığı sunmaktayız.

Ayrıca ISO27001 Bilgi Güvenliği Yönetim Sistemi belgelendirmesi olan kurumlarda, Bilgi ve İletişim Güvenliği Rehberi’ne uyum değerlendirmesi, rehber tedbirlerinin ISO27001 kontrolleri ile uygulanması, eksik kalınan noktaların belirlenmesi gibi hizmetleri, uzman kadromuz tarafından özel olarak hazırlanan kontrol listesi ile vermekteyiz.

Bilgi Iletisim Guvenligi Rehberi Min

Critical Infrastructure Security 

Within the scope of the R&D Projects of the Presidency of the Republic of Türkiye Secretariat of Defense Industries, we develop defense solutions for Industrial Control Systems (ICS) in the field of Operational Technology (OT). With our domestic and national solutions, we carry out attack detection for the assets in the Operational Technology area in the project.

Our solutions cover the following main modules:

OT Asset/Vulnerability Management

We ensure that the asset management of IT and OT devices is dynamically discovered, classified and device profiles are created and vulnerabilities for devices are extracted.

Deep Packet Analysis

With the approach applied in industrial control systems, we collect data from end system devices and network traffic by placing sensors (data collection points) at different points of the topology in industrial control systems. We increase the visibility of the OT network segment by performing deep packet inspection on the packets of OT protocols (e.g. IEC 61850, IEC 60870-5-104, MODBUS, PROFINET, S7, DNP3, BACnet, ETERCAT, CIP etc.).

Anomaly Detection

We use different intrusion detection methods for OT based systems as Anomaly Detection System.

  • Signature-based attack detection over network traffic
  • Process monitoring specific to the field of Operation Technology and status analyses for industrial devices such as PLC, RTU etc.
  • Creation of behavioral models with artificial intelligence-based approaches

Merkezi Yonetim Sistemi Min

Central Management System

As HAVELSAN, we offer a central management monitoring capability that enables the consolidation of the collected data in a central location. We provide event statistics and visualizations generated from sensor data from a single point in identifying any cyber-attack or abnormal event occurring in the Operational Technology (OT) infrastructure for users. We generate alarms with anomaly detection methods based on deep packet analysis results. In this way, we create a strong cyber defense mechanism for our customers by minimizing security vulnerabilities in industrial infrastructures.

With these advanced services, we develop solutions to increase cyber resilience in critical systems (energy and natural gas production facilities, nuclear facilities, water networks, health systems, land, air, sea and rail transportation control systems, etc.).

MORE INFORMATION?

For questions about our Cyber Security Services, please contact us

Contact Us

Contact Us

Write down the word (min. 3 character) you are searching for and press "enter".
Press "ESC" to close.