Patent attributes
Embodiments of the present disclosure are directed to a number of systems, apparatuses, and methods for scoring, rating, the cyber-security of a network, and the configuration, control, and remediation, thereof. Accordingly, in some embodiments, a network security evaluation method is provided which may comprise operating an investigatory container (IC) with access to a first network (FN), and retrieving first data by the IC from a source external to the FN. The first data can correspond to at least one of an inventory of security devices provided on the FN, plug-in module information for each security device provided on the FN, each plug-in module configured to allow the IC to communicate with a respective security device of the FN, and login information associated with each security device of the FN. The method can also include logging into each security device of the FN via a respective plug-in using the retrieved, respective login information, analyzing each security device so as to obtain security data of the FN related to a plurality of network elements, and determining whether the security data meets or exceeds a minimum-viable-data (MVD) for the FN, the MVD corresponding to an indication that the FN provides effective risk management. Upon confirmation, for example, at least one of a score and rating of the cyber-security of the network can be determined.