Identify improper configurations to minimize the number of inherent vulnerabilities and harden your system against targeted attacks.

Defense-In-Depth Approach

Defense-in-Depth is that layered security mechanisms increase security of the system as a whole. If an attack causes one security mechanism to fail, other mechanisms may still provide the necessary security to protect the system.

A Secure Configuration Audit protects vulnerabilities against sophisticated, targeted long term attacks where attackers can gain access to privileged systems and data. Even a zero-day attack has less of a chance resulting in a security breach in a securely configured system.

Secure Configuration Audit provides visibility on-

  • User access control on systems
  • Password and account policies
  • Services and applications running on critical systems
  • The current set of missing security patches

System Configuration

A secure configuration audit checks every facet of your network for the vulnerabilities that attackers can exploit to gain access. This includes – Network / Security Device, Databases and Operating System.

    Network/Security Device

  • User access control on systems
  • Password and account policies
  • Services and applications running on critical systems
  • The current set of missing security patches

    Database

  • Account Authentication
  • Password Policy
  • Account Privileges
  • Logging and Tracing
  • Network Access Mechanism
  • Patching
  • Files and Directories Permission

    Operating System

  • File System Security
  • Account Policies
  • Access Control
  • Network Settings
  • System Authentication
  • Logging and Auditing
  • Patches and Updates

Our Reports

At the conclusion of the secure configuration audit, our team of experts provides a final report with detailed findings, a risk rating, and suggestions for mitigating those risks.