
(NOTE: After CISA receives the required paperwork for an RVA, you will be prioritized based on national mission needs, number of prior stakeholders in your sector, etc. There is one week of testing from the internet and one week of evaluation, at your location, internal to your network. The assessment period differs by the number and type of services requested, but a typical RVA will take place over a two week period. web application or database evaluations,.network mapping and vulnerability scanning,.Phishing Campaign Assessment (PCA) Sample ReportĪ Risk and Vulnerability Assessment (RVA) allows you to select from a menu of several network security services, including:.The assessment occurs over a 6 week period, and the results can be used to provide guidance for anti-phishing training and awareness. Phishing is commonly used as a means to breach an organization’s network. After we receive the required paperwork for Cyber Hygiene, our scans will start within 72 hours and you’ll begin receiving reports within two weeks.Ī Phishing Campaign Assessment (PCA) measures your team’s propensity to click on email phishing lures. Once initiated, this service is mostly automated and requires little direct interaction. CISA performs regular network and vulnerability scans and delivers a weekly report for your action. Validated Architecture Design Review (VADR)Ĭyber Hygiene: Vulnerability Scanning helps secure your internet-facing systems from weak configuration and known vulnerabilities, and encourages the adoption of modern security best practices.Risk and Vulnerability Assessment (RVA).Request information about the service(s) you are interested in by emailing services are available at no cost to federal agencies, state and local governments, critical infrastructure, and private organizations generally.
