Secure Configuration AuditBack

A detailed review of security configurations, based on manual review of configuration settings of assets.

The Objective of the review include:

Identifying vulnerabilities on high network and security devices such as High risk user accounts and group configurations, user and group administration / configuration control processes, configuration weaknesses etc.

Identifying Access control deficiencies such as excessive or inappropriate user and application/service privileges, etc.

Identify and examine security control settings on network services associated with supporting perimeter protection.

We commonly perform configuration audit for Routers, Switches, Firewall, Linux & Windows Servers. Based on the client request we will perform reviews of other specific devices also.


Back