Skip to main content
Methodology • MTH-001

M&A Due Diligence Process

A structured six-phase methodology for evaluating cyber risk in M&A transactions. Each phase produces defined deliverables calibrated for investment committee consumption, legal counsel review, and deal team decision-making.

Overview

Undisclosed breaches, regulatory non-compliance, and technical debt represent quantifiable liabilities that transfer directly to the acquirer upon closing. Conventional financial due diligence rarely examines technology infrastructure with the depth required to surface these exposures, leaving acquirers to inherit cyber liabilities that erode returns and require unplanned capital expenditure.

Intarmour's process is designed to operate within compressed competitive auction and bilateral negotiation timelines, delivering actionable intelligence at each phase without sacrificing rigour. Every engagement follows six phases, adapted in scope and depth to the transaction and target company risk profile.

This methodology is the foundation of our Technical Due Diligence capability — governing engagement, assessment, quantification, and client support. The result is consistent, defensible cyber risk assessment integrating seamlessly with financial models, warranty negotiations, and investment committee reporting.

Phase 1

Engagement Initiation

Structured initiation establishes the legal, operational, and commercial framework for the assessment. Conditions set here govern confidentiality, scope, and effectiveness of all subsequent work.

A mutual NDA is executed first, drafted specifically for M&A contexts addressing deal-specific confidentiality, restrictions on target company identity disclosure, information sharing limitations, and GDPR-compliant data handling provisions.

Scope definition follows, working with the deal team to define entity and system boundaries, anticipated access levels, applicable regulatory frameworks, and priority risk categories. Reporting format, addressees, and timeline are agreed — with specific milestone dates aligned to the transaction calendar. Standard engagement allows twenty business days from initiation to final deliverable; accelerated timelines of ten to fifteen days are available.

Phase 2

Information Gathering

Three parallel workstreams — data room review, management interviews, and external reconnaissance — ensure efficient use of the assessment window while allowing findings from each to inform the others.

Data room access provides the documentary foundation: security policies, network architecture, asset inventories, vulnerability and penetration testing reports, incident response plans, business continuity documentation, compliance certifications, third-party audit reports, and insurance details. Documentation completeness itself is a diagnostic indicator of security maturity.

Management interviews follow a structured protocol with CIO, CISO, Head of IT Operations, DPO, and business unit leaders, covering governance, incident history, investment priorities, known vulnerabilities, third-party risk, and regulatory compliance. Findings are cross-referenced with documentary evidence and reconnaissance results to identify discrepancies.

External reconnaissance operates independently: domain infrastructure analysis, exposed service enumeration, SSL/TLS certificate mapping, credential leak monitoring, DNS analysis, and technology stack identification. This frequently surfaces material findings absent from internal documentation.

Phase 3

Technical Assessment

Gathered information is translated into structured findings across four domains: architecture review, vulnerability assessment, compliance audit, and data protection review.

Architecture review evaluates network segmentation, identity and access management, cloud configuration, endpoint protection, security monitoring, backup and disaster recovery, and development pipelines. The objective is assessing whether security architecture is sound or requires significant capital investment to remediate, directly informing integration planning and CapEx projections.

Vulnerability assessment identifies specific weaknesses through controlled scanning of internet-facing assets, review of existing testing reports, patch management evaluation, and threat intelligence-informed exposure analysis. Findings are categorised by severity and exploitability, focusing on vulnerabilities that could trigger regulatory notification or material business disruption.

Compliance audit evaluates regulatory posture across GDPR, NIS2, sector-specific regulations (DORA, MDR), and data localisation requirements, assessing substance of compliance rather than merely policy existence. The data protection review examines processing activities, consent mechanisms, data subject rights, DPIAs, and international transfer mechanisms — areas where non-compliance frequently represents the most material financial liability in European transactions.

Phase 4

Risk Quantification

Technical findings are transformed into financial terms for investment committees and legal counsel: a quantified view of cyber liability informing purchase price adjustments, warranty provisions, and post-acquisition capital planning.

Financial impact modelling estimates monetary exposure: breach notification costs based on data volume and sensitivity, regulatory penalty exposure using enforcement precedent analysis, business interruption costs modelled against revenue dependencies, remediation costs for technical debt, and reputational impact. Each estimate includes probability-weighted scenarios — base, adverse, and severe but plausible — for financial model integration.

Remediation cost estimation provides itemised projections covering technology, implementation, personnel, and ongoing operational costs, organised by priority tier: critical remediations for immediate post-close action versus improvements sequenced over twelve to twenty-four months. This feeds directly into value creation planning and the hundred-day agenda.

Probability assessment considers sector threat profile, control maturity, historical incident data, technology-specific threat intelligence, and regulatory enforcement trends. Combined with impact modelling, this produces expected-loss calculations translating into purchase price adjustment recommendations and warranty indemnification quantum.

Phase 5

Deliverable Production

Three primary deliverables, each serving a distinct purpose in the transaction process: executive summary, comprehensive technical report, and integration roadmap.

The executive summary (8-12 pages) is the primary investment committee deliverable: summary risk rating with rationale, quantified financial exposure across scenarios, key findings by materiality, purchase price and warranty recommendations, and remediation cost overview. Designed for standalone consumption by decision-makers.

The technical report (40-80 pages) provides comprehensive documentation: detailed domain findings with evidence, methodology documentation for independent verification, vulnerability inventory with severity and exploitation analysis, compliance gap analysis with regulatory mapping, and interview and evidence cross-references. The definitive assessment record for warranty negotiations and remediation planning.

The integration roadmap translates findings into a prioritised post-acquisition security improvement plan with estimated costs, resources, and timelines. Distinguishes between hundred-day actions, first-year improvements, and longer-term strategic initiatives, connecting cyber remediation with broader value creation objectives.

Phase 6

Post-Delivery Support

The assessment extends beyond report delivery, ensuring findings are effectively communicated and the commissioning party has context to act on recommendations.

We present findings directly to the investment committee, translating technical analysis into the risk-return framework governing investment decisions: implications for valuation, warranty negotiation considerations, remediation investment requirements, and comparative benchmarking. We prepare for the full range of committee questions, from specific vulnerabilities to strategic competitive implications.

Post-delivery, we remain available for follow-up: clarification for legal counsel drafting warranties, additional risk category analysis, updated assessment if new information emerges, and coordination with other diligence workstreams. Support extends through transaction completion and, where the client proceeds, transitions into Post-Merger Security Integration planning.

For ongoing portfolio management, post-delivery support may extend into a continuing relationship governed by our Advisory Engagement Approach, ensuring continuity between transaction assessment and portfolio-level security governance. Intelligence from pre-acquisition assessment directly accelerates post-close improvement, eliminating information loss from separate advisory engagements.

Standard Timeline

1

Initiation

2-3 days

2

Gathering

5-7 days

3

Assessment

5-7 days

4

Quantification

3-4 days

5

Deliverables

3-5 days

6

Support

Ongoing

Standard engagement: 20 business days from initiation to final deliverable. Accelerated timelines of 10–15 business days available for time-sensitive transactions.

Ready for institutional-gradecybersecurity?

Confidential assessments for qualified Private Equity and Family Office entities requiring sovereign defense infrastructure.