The configuration of your informational assets plays a pivotal role in determining the robustness of your security and defence capabilities. We offer Configuration Review services to ensure that your assets are hardened to protect and thwart attackers.

  • Identification of vulnerabilities and misconfigurations that may expose critical assets.
  • Configuration exposures are generally not identified solely from Vulnerability Assessments or fully understood as to how an attacker can leverage or chain vulnerabilities that will have a wider-impact.
  • Tailored assessments to provide assurance your assets are secured against evolving threats.
  • Analysis of key security controls.
  • Recommendations for securing configuration and ensuring compliance against industry guidance and best practices.
  • Server, Workstation/EUD Device and Database reviews
  • Active Directory Review
  • Mobile Device Management/Mobile Device Review
  • Network Devices including Firewalls, Switches, Routers, Wireless Controllers and more
  • Secure Environment Breakout Testing
  • Stolen Device Review and more…

A Configuration Review is an in-depth analysis of security settings and controls that can be applied to your assets and ensure they are configured optimally for security, and compliance that can bring the following benefits.

Security Enhancement. Identify and rectify misconfigurations that may be exploited by threats, enhancing the overall security posture of your IT infrastructure and assets.

Compliance. Align configurations with industry standards and regulatory requirements to ensure compliance with data protection laws and other relevant mandates.

Vulnerability Mitigation. Address potential vulnerabilities arising from misconfigurations, reducing the attack surface and minimising the risk of security breaches.

Risk Reduction. Proactively assess and mitigate risks associated with improper configurations, preventing potential disruptions to your business operations.

Reporting. Focuses on addressing and remediating configuration gaps to enhance security across your infrastructure. Clearly highlighting the risks from default or misconfigurations and steps to take, to start remediation.

Consultants will draw upon their experience, showing how chaining together certain misconfigurations can lead to increasing the likelihood of a compromise and the impact this may have on your organisation. The following highlights example configuration checks made during an assessment.

Server Build

Patch Management
Local Security Policy
Monitoring and Auditing
Endpoint Controls AV/Firewall
Application Control Policies
Credential Handling

Workstation

Patch Management
Local Security Policy
Monitoring and Auditing
Endpoint Controls AV/Firewall
Application Control Policies
Credential Handling
Endpoint Encryption
Data Loss Prevention

Network Devices

Management Access
Clear-text Services
Password Management & Security
Disabled Unused Interfaces
Monitoring and Logging
Port Security

Databases

Patch Management
Surface Area Reduction
Authentication and Authorisation
Password Policies
Auditing and Logging
Application Development
Database Encryption

Active Directory

AD User & Group Audit
AD Password Audit
AD GPO Configuration
AD Least Privileged
Kerberos Vulnerabilities
AD Certificate Services

Firewall Review

ACL Rule-base Review
Management Access Rules
Cleartext Access Rules
Logging and Monitoring
Authentication & Authorisation
Documented Design

Our experienced consultants are dedicated to identifying and rectifying configuration issues, and improving the overall security posture of your business assets. By choosing us to secure your configurations you are investing in the resilience your infrastructure.

Reach out today to learn more about our services and how we can assist you in securing configurations and reducing risks.

Scroll to Top