{"id":26668,"date":"2021-01-04T04:32:58","date_gmt":"2021-01-04T04:32:58","guid":{"rendered":"https:\/\/host.lalaith.com\/?page_id=26668"},"modified":"2025-02-21T15:54:14","modified_gmt":"2025-02-21T19:54:14","slug":"cybersecurity-scorecard","status":"publish","type":"page","link":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/","title":{"rendered":"Cybersecurity Scorecard"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"26668\" class=\"elementor elementor-26668\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-acb4865 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"acb4865\" data-element_type=\"section\" data-e-type=\"section\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-thegem\"><div class=\"elementor-row\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-263fe011\" data-id=\"263fe011\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3ff351c3 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-invisible elementor-widget elementor-widget-text-editor\" data-id=\"3ff351c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\r\n\t\t\t\t\t\tSystems must be compliant with Federal and internal policies, directives, and guidance, but any system that stops there isn&#8217;t as secure as it needs to be in this age of security threats. To make a system secure, there are a variety of services, tools, and practices that must be adopted. But adding security components without understanding how they fit into a single, consolidated vision is counterproductive and can leave security holes big enough for the skilled or the tenacious to exploit. So before making changes or jumping to conclusions about a system&#8217;s security, we audit a system using both qualitative and quantitative exploration from certified experts in the cybersecurity domain. We track our information within a Cybersecurity Scorecard, which is a heuristic technique that allows us to give a rating to ten criteria and receive an aggregate score that gives a reasonable understanding of a system&#8217;s surface of vulnerability and the work that may be required to harden it.\n<ul>\n \t<li><a href=\"https:\/\/www.lalaith.com\/wp-content\/uploads\/Cybersecurity-Scorecard-Practical-Security.pdf\" target=\"_blank\" rel=\"noopener\">Cybersecurity Scorecard &#8211; Practical Security<\/a> [PDF]\nMaintaining systems and network cybersecurity involves multiple disciplines and domains working in harmony against unknown threats. This scorecard addresses the practical side of cybersecurity with ten criteria designed to gain in-depth understanding of a system and recognize potential vectors. Contact us for an Excel version of the file.<\/li>\n<\/ul>\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b37aaf0 elementor-view-default elementor-position-block-start elementor-mobile-position-block-start flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-icon-box\" data-id=\"b37aaf0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<a href=\"\/index.php\/contact-us\/\" class=\"elementor-icon\" tabindex=\"-1\" aria-label=\"Security Auditing\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-users\"><\/i>\t\t\t\t<\/a>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"\/index.php\/contact-us\/\" >\n\t\t\t\t\t\t\tSecurity Auditing\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOur approach to systems and security auditing focuses on a qualitative and quantitative exploration of a multitude of variables from technology stack to finances to business goals and desired outcomes. While we have provided a sample of our cybersecurity scorecard, we encourage prospective clients who are interested in learning more or conducting an impartial, third-party assessment to contact us directly.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2740b59 flex-horizontal-align-default flex-horizontal-align-tablet-default flex-horizontal-align-mobile-default flex-vertical-align-default flex-vertical-align-tablet-default flex-vertical-align-mobile-default elementor-widget elementor-widget-thegem-contact-form7\" data-id=\"2740b59\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;thegem_elementor_preset&quot;:&quot;default&quot;}\" data-widget_type=\"thegem-contact-form7.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f26472-o1\" lang=\"en-US\" dir=\"ltr\" data-wpcf7-id=\"26472\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/26668#wpcf7-f26472-o1\" method=\"post\" class=\"wpcf7-form init thegem-cf7 form-2740b59 label-top\" aria-label=\"Contact form\" novalidate=\"novalidate\" data-status=\"init\">\n<fieldset class=\"hidden-fields-container\"><legend class=\"screen-reader-text\">Hidden fields<\/legend><input type=\"hidden\" name=\"_wpcf7\" value=\"26472\" \/><input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.1.5\" \/><input type=\"hidden\" name=\"_wpcf7_locale\" value=\"en_US\" \/><input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f26472-o1\" \/><input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/><input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/><input type=\"hidden\" name=\"_wpcf7_recaptcha_response\" value=\"\" \/>\n<\/fieldset>\n<div class=\"row\">\n<div class=\"form-line col-lg-4 col-md-6 col-xs-12\"><div class=\"gem-form-icon-name\"><span class=\"wpcf7-form-control-wrap\" data-name=\"client-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Name\" value=\"\" type=\"text\" name=\"client-name\" \/><\/span><\/div><\/div>\n<div class=\"form-line col-lg-4 col-md-6 col-xs-12\"><div class=\"gem-form-icon-email\"><span class=\"wpcf7-form-control-wrap\" data-name=\"client-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Email\" value=\"\" type=\"email\" name=\"client-email\" \/><\/span><\/div><\/div>\n<div class=\"form-line col-lg-4 col-md-12 col-xs-12\"><span class=\"wpcf7-form-control-wrap\" data-name=\"request-topic\"><select class=\"wpcf7-form-control wpcf7-select gem-combox\" aria-invalid=\"false\" name=\"request-topic\"><option value=\"Select Your Interest\">Select Your Interest<\/option><option value=\"Cloud Services\">Cloud Services<\/option><option value=\"Cloud Service - Financial Planning\">Cloud Service - Financial Planning<\/option><option value=\"Cloud Service - Readiness Assessment\">Cloud Service - Readiness Assessment<\/option><option value=\"Cloud Service - Migration\">Cloud Service - Migration<\/option><option value=\"Cloud Service - Operations and Maintenance\">Cloud Service - Operations and Maintenance<\/option><option value=\"Cloud Solution - Cloud Migration Plan\">Cloud Solution - Cloud Migration Plan<\/option><option value=\"Cybersecurity\">Cybersecurity<\/option><option value=\"Cybersecurity - Identity and Access Management\">Cybersecurity - Identity and Access Management<\/option><option value=\"Cybersecurity - RMF and ATO Support Services\">Cybersecurity - RMF and ATO Support Services<\/option><option value=\"Cybersecurity - Training\">Cybersecurity - Training<\/option><option value=\"Program and Project Management\">Program and Project Management<\/option><option value=\"Program and Project Management - Portfolio and Program Management\">Program and Project Management - Portfolio and Program Management<\/option><option value=\"Program and Project Management - Risk Management\">Program and Project Management - Risk Management<\/option><option value=\"Program and Project Management - Transition Management\">Program and Project Management - Transition Management<\/option><option value=\"Program and Project Management - Stakeholder Engagement and Alignment\">Program and Project Management - Stakeholder Engagement and Alignment<\/option><option value=\"Program and Project Management Solution - SAFe DevSecOps Playbook\">Program and Project Management Solution - SAFe DevSecOps Playbook<\/option><option value=\"Software Development\">Software Development<\/option><option value=\"Software Development - Continuous Delivery Pipeline\">Software Development - Continuous Delivery Pipeline<\/option><option value=\"Software Development - UX Research and Design\">Software Development - UX Research and Design<\/option><option value=\"Software Development Solution - Google Design Sprint\">Software Development Solution - Google Design Sprint<\/option><option value=\"Software Development Solution - SAFe DevSecOps Playbook\">Software Development Solution - SAFe DevSecOps Playbook<\/option><option value=\"The Lalaith Astor Company\">The Lalaith Astor Company<\/option><option value=\"Something Else\">Something Else<\/option><\/select><\/span><\/div>\n<div class=\"col-lg-12 col-md-12 col-xs-12\"><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Get in Touch\" \/><\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div><\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Systems must be compliant with Federal and internal policies, directives, and guidance, but any system that stops there isn&#8217;t as&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":25343,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"page-fullwidth.php","meta":{"footnotes":""},"class_list":["post-26668","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Scorecard - Lalaith Astor Technical Consulting House<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Scorecard - Lalaith Astor Technical Consulting House\" \/>\n<meta property=\"og:description\" content=\"Systems must be compliant with Federal and internal policies, directives, and guidance, but any system that stops there isn&#8217;t as...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/\" \/>\n<meta property=\"og:site_name\" content=\"Lalaith Astor Technical Consulting House\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-21T19:54:14+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/\",\"url\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/\",\"name\":\"Cybersecurity Scorecard - Lalaith Astor Technical Consulting House\",\"isPartOf\":{\"@id\":\"https:\/\/www.lalaith.com\/#website\"},\"datePublished\":\"2021-01-04T04:32:58+00:00\",\"dateModified\":\"2025-02-21T19:54:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lalaith.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Our Capabilities\",\"item\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity Scorecard\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lalaith.com\/#website\",\"url\":\"https:\/\/www.lalaith.com\/\",\"name\":\"Lalaith Astor Technical Consulting House\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.lalaith.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lalaith.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lalaith.com\/#organization\",\"name\":\"Lalaith Astor Technical Consulting House\",\"url\":\"https:\/\/www.lalaith.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png\",\"contentUrl\":\"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png\",\"width\":492,\"height\":492,\"caption\":\"Lalaith Astor Technical Consulting House\"},\"image\":{\"@id\":\"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/lalaith-astor-technical-consulting-house\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Scorecard - Lalaith Astor Technical Consulting House","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Scorecard - Lalaith Astor Technical Consulting House","og_description":"Systems must be compliant with Federal and internal policies, directives, and guidance, but any system that stops there isn&#8217;t as...","og_url":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/","og_site_name":"Lalaith Astor Technical Consulting House","article_modified_time":"2025-02-21T19:54:14+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/","url":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/","name":"Cybersecurity Scorecard - Lalaith Astor Technical Consulting House","isPartOf":{"@id":"https:\/\/www.lalaith.com\/#website"},"datePublished":"2021-01-04T04:32:58+00:00","dateModified":"2025-02-21T19:54:14+00:00","breadcrumb":{"@id":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/cybersecurity-scorecard\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lalaith.com\/"},{"@type":"ListItem","position":2,"name":"Our Capabilities","item":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/www.lalaith.com\/index.php\/our-capabilities\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Scorecard"}]},{"@type":"WebSite","@id":"https:\/\/www.lalaith.com\/#website","url":"https:\/\/www.lalaith.com\/","name":"Lalaith Astor Technical Consulting House","description":"","publisher":{"@id":"https:\/\/www.lalaith.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lalaith.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.lalaith.com\/#organization","name":"Lalaith Astor Technical Consulting House","url":"https:\/\/www.lalaith.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png","contentUrl":"https:\/\/www.lalaith.com\/wp-content\/uploads\/latch-stacked-492x492-1.png","width":492,"height":492,"caption":"Lalaith Astor Technical Consulting House"},"image":{"@id":"https:\/\/www.lalaith.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/lalaith-astor-technical-consulting-house"]}]}},"_links":{"self":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/26668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/comments?post=26668"}],"version-history":[{"count":36,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/26668\/revisions"}],"predecessor-version":[{"id":33104,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/26668\/revisions\/33104"}],"up":[{"embeddable":true,"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/pages\/25343"}],"wp:attachment":[{"href":"https:\/\/www.lalaith.com\/index.php\/wp-json\/wp\/v2\/media?parent=26668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}