CONFIGURATION REVIEW

What is Configuration Review?

Every asset in an organization is setup with a certain configuration. These assets include, but not limited to – routes, firewall, switches, server, endpoint etc. Regardless of how it looks, any mistakes when it comes to the installation or configuration of networks, servers, and other infrastructure can cause a devastating effect through your entire organisation.

Why Your Company Need It?

Without regular reviews, any poorly configured component of your systems can be the weak link that allows an attacker to wreak havoc across your entire IT estate, causing outages and leaving you vulnerable to a security breach. Therefore, understanding how your new installation sits within your IT environment is vital.

We audit the security configuration of your key IT assets based on industry-standard benchmarks and ensure that each component of your IT infrastructure is working in harmony and as securely as possible.

Methodology

  • Pre-Engagement

    In this section we will discuss about timelines, scoping, location, time of the day to test and other such requirement to start the assessment

  • Vulnerability Analysis

    In vulnerability analysis phase we will try to discover flaws in configuration via both automated an manual approach. For router/switches/firewall configuration file is pulled and is analysed for weaknesses. For server/desktop group policy is reviewed on sampling basis.

  • Report

    Provide recommendation and conduct debrief of identified vulnerabilities

  • Revalidation

    Once the necessary configuration updates are implemented, re-test for identified vulnerability is done to make sure if the fix has been properly implemented.

Benefits For Your Organization

  • Helps an organization to reduce attack surface for a malicious user.
  • Reduced risk of outages and security breaches through visibility and tracking of the changes to your systems.
  • Cost reduction by avoiding wasteful duplication of your technology assets.
  • Restrict access to each computer and device.
  • Restrict permissions to files, services, registry entries and end-points.