Form cover
Page 1 of 2

Assess Your Breach Risk

Answer 20 technical questions to evaluate your organization's exposure to real-world attack paths.


Which industry best represents your primary operations?

Which industry best represents your primary operations?
A
B
C
D
E
F
G

Where is multi-factor authentication NOT consistently enforced?

Where is multi-factor authentication NOT consistently enforced?
A
B
C
D
E
F

How is your identity provider secured?

How is your identity provider secured?
A
B
C
D
E

How are privileged/admin accounts managed?

How are privileged/admin accounts managed?
A
B
C
D
E

How are service accounts and secrets managed?

How are service accounts and secrets managed?
A
B
C
D
E

How do you detect and prevent session/token abuse?

How do you detect and prevent session/token abuse?
A
B
C
D
E

What is the coverage level of your EDR/XDR solution?

What is the coverage level of your EDR/XDR solution?
A
B
C
D
E

What is your endpoint security baseline?

What is your endpoint security baseline?
A
B
C
D
E

What is your remediation window for critical vulnerabilities (CVSS 9–10)?

What is your remediation window for critical vulnerabilities (CVSS 9–10)?
A
B
C
D
E

How complete is your asset visibility?

How complete is your asset visibility?
A
B
C
D
E

How is lateral movement restricted?

How is lateral movement restricted?
A
B
C
D
E

How well do you understand your external exposure?

How well do you understand your external exposure?
A
B
C
D
E

How quickly would you detect a compromised endpoint or account?

How quickly would you detect a compromised endpoint or account?
A
B
C
D
E

What detection stack is in place?

What detection stack is in place?
A
B
C
D
E

What level of logging visibility do you have?

What level of logging visibility do you have?
A
B
C
D
E

How long are logs retained?

How long are logs retained?
A
B
C
D
E

How is application security managed?

How is application security managed?
A
B
C
D
E

How is sensitive data access managed?

How is sensitive data access managed?
A
B
C
D
E

Do you have an incident response capability?

Do you have an incident response capability?
A
B
C
D
E

What is your recovery capability?

What is your recovery capability?
A
B
C
D
E