Home Assessments Solutions Reports Research Contact
// Security assessments

Don't take our word for it. Read what you'd receive.

Every assessment ships with a written deliverable. Below are redacted excerpts from real engagements — the actual document quality, structure, and detail you walk away with.

// 01 · External Threat Exposure

What an external assessment looks like

A 4,000-employee healthcare provider asked us to validate their attack surface ahead of a payor audit. The excerpt below is page 7 of the executive deliverable.

XECURELOGIC
External Threat Exposure Assessment
Engagement ██████████ · 2025-Q4
Doc revision 2.1 · Page 07 of 42
Executive findings — critical exposure

During asset attribution, the engagement identified 3 internet-facing systems attributable to the organization that were absent from the asset inventory provided at kickoff. Of these, one (vpn-legacy.██████.com) terminated an obsolete IPSec stack vulnerable to CVE-2024-3400 with a publicly available exploit chain.

High-severity findings · summary
EXT-01Pre-auth RCE on legacy VPN concentratorCRITICAL
EXT-02Production DB credentials leaked via public GitHub forkCRITICAL
EXT-03M365 tenant subject to attacker-controlled federated domainHIGH
EXT-04Patient-portal subdomain takeover via dangling CNAMEHIGH
Recommendation summary

Remediation effort is concentrated in three workstreams (asset retirement, credential rotation, federation hardening). Estimated engineering time: ~80 hours. A 30-day retest is included; details in §9 (Remediation Plan).

XecureLogic LLC · Confidential Page 07 / 42

Excerpt · External Threat Exposure deliverable

// 02 · Internal Threat Assessment

What an internal assessment looks like

A regional bank engaged us 60 days after a new CISO joined. The excerpt below is from §4 (Lateral Movement Modeling) of the technical deliverable.

XECURELOGIC
Internal Threat Assessment
Engagement ██████████ · 2025-Q3
Doc revision 1.4 · Page 23 of 67
Lateral movement — Tier-0 reachability

The engagement modeled lateral movement from a generic helpdesk-tier credential (HELPDESK-█████) to Tier-0 assets. Four distinct paths reached domain admin in fewer than 6 hops; the shortest required 3 hops and exploited unconstrained delegation on a legacy print-server.

Reachability matrix · Tier-0
FromViaHopsDetection
Helpdesk service acctUnconstrained delegation · PRINTSRV-043Not logged
Generic domain userADCS ESC1 misconfig4Logged · no alert
Backup operator groupDCSync abuse via stale ACL5Not logged
Finance desktopSCCM client push misconfig6Logged · alerted
Detection gap · MITRE coverage

Of the four paths, three rely on techniques (T1558.003, T1649, T1003.006) for which the SIEM ruleset has no detection content. Recommended Sigma rules and Defender XDR queries are provided in Appendix C.

XecureLogic LLC · Confidential Page 23 / 67

Excerpt · Internal Threat Assessment deliverable

// 03 · Compliance Validation

What a compliance gap report looks like

A SaaS company engaged us for SOC 2 Type II readiness with a 90-day audit window. The excerpt below is the per-control gap register — the document an external auditor consumes directly.

XECURELOGIC
SOC 2 Type II Gap Assessment
Engagement ██████████ · 2025-Q4
Doc revision 1.0 · Page 14 of 38
Gap register · CC6 (Logical access)
ControlStatusGapEffort
CC6.1 — Access provisioningGAPNo documented JML process for contractor accountsL
CC6.2 — User registrationMET
CC6.3 — Access modificationGAPPrivileged-access reviews not performed quarterlyM
CC6.6 — External accessGAPVPN allows password-only auth for vendor accountsL
CC6.7 — Data transmissionMET
Auditor-facing notes

Each gap row is paired with: (a) reproduction evidence, (b) remediation owner, (c) target close date, and (d) the framework cross-walk to ISO 27001 A.9 and NIST 800-53 AC-2. See Appendix B for cross-framework map.

XecureLogic LLC · Confidential Page 14 / 38

Excerpt · SOC 2 Gap Assessment deliverable

Want a deliverable like this for your environment?

Most engagements start with a 30-minute scoping call. We'll tell you whether we can help — or who can — by the end of it.

Scope an engagement →