HomeCase StudiesSonoma County
Cybersecurity

ROV Cybersecurity Assessment & Penetration Testing

Comprehensive cybersecurity services for Sonoma County Registrar of Voters (ROV), including security assessments, vulnerability assessments, penetration testing, and social engineering tests to protect critical election infrastructure.

Client
Sonoma County
Industry
Government
Sonoma County logo

Sonoma County

Official Government Partner

Verified Client
ISO 9001:2015 Certified
ISO 27001:2022 Security
Government Contractor
On-Time Delivery

Project Overview

QLogic was selected by Sonoma County to provide comprehensive cybersecurity services for the Registrar of Voters (ROV) systems and networks. Our team delivers a full suite of security assessments designed to identify vulnerabilities, test defenses, and ensure alignment with the NIST Cybersecurity Framework (CSF). This critical engagement protects election infrastructure and sensitive voter data through rigorous security testing and actionable recommendations.

Project Objectives

  • Conduct comprehensive security assessment of ROV systems and networks
  • Perform systematic vulnerability assessment across all network infrastructure
  • Execute internal and external penetration testing on 65+ hosts
  • Design and perform social engineering campaigns to test employee awareness
  • Evaluate security alignment with NIST Cybersecurity Framework (CSF)
  • Deliver detailed reports with prioritized remediation recommendations

Challenges Addressed

Securing election infrastructure requires the highest level of security rigor while maintaining operational continuity for critical democratic processes.

  • Critical election infrastructure requiring zero disruption during testing
  • Complex network architecture including air-gapped systems with 12 live devices
  • Multiple network perimeters separating ROV from County networks and internet
  • Need to test 65 internal hosts, firewalls, and internet-facing applications
  • Strict timeline with all services to be completed by January 31, 2026
  • Balancing thorough security testing with operational requirements
Our Approach

Solutions Delivered

Our cybersecurity team delivers a comprehensive four-phase security engagement following industry best practices and controlled testing methodologies.

Step 01

Security Assessment: Complete audit of security framework, policies, procedures, and controls including firewall configuration review

Step 02

Vulnerability Assessment: Network scanning of Class-C and air-gapped networks with documented findings prioritized by risk and impact

Step 03

Penetration Testing: Internal and external tests following requirement analysis, threat identification, vulnerability evaluation, exploitation, and post-exploitation phases

Step 04

Social Engineering: Impersonation test campaigns to assess employee susceptibility with training recommendations

Step 05

CSF Alignment Analysis: Examination of cybersecurity efforts alignment with NIST Cybersecurity Framework

Step 06

Comprehensive Reporting: Detailed deliverables including methodologies used, exploited vulnerabilities, and remediation roadmap

Project Impact

Measurable results that demonstrate the value delivered

65+
Internal Hosts
Systems tested for vulnerabilities
4
Assessment Types
Security, Vulnerability, Pentest, Social Engineering
2
Network Types
Class-C and Air-Gapped networks
CSF
Framework Aligned
NIST Cybersecurity Framework

Technologies & Tools

Penetration Testing ToolsVulnerability ScannersNetwork AnalysisFirewall AssessmentSocial Engineering PlatformsNIST CSF FrameworkSecurity Audit ToolsThreat Intelligence

Ready to Achieve Similar Results?

Let's discuss how we can help transform your organization with our proven expertise and methodology.