WHAT IS A BUILD & CONFIGURATION REVIEW?
A Build & Configuration Review is a comprehensive assessment of individual devices. Using an authenticated approach to identify vulnerabilities, insecure configuration settings, access to sensitive content and other issues which could lead to data disclosure or device compromise.
TYPES OF BUILD & CONFIGURATION REVIEW
Build & Configuration reviews can be conducted against a number of devices. Several types of Reviews exist to focus on each of these areas in detail and although more focused tests exist, the high-level categories are summarised as follows:
WORKSTATION BUILD & CONFIGURATION REVIEW
A review of a standard user workstation aims to search for vulnerabilities and data which can be exploited by a unauthenticated or low privileged user account. Workstations can be the target of a number of attacks which aim to exploit the device or the user and form an important part of any organisation’s security…
SERVER BUILD & CONFIGURATION REVIEW
Server Build Reviews aim to assess the security of devices providing critical business functionality and help to ensure the data and functionality they provide is protected. Servers can be intended for public or private access and can therefore be targeted by a range of potential attacks. Ensuring their secure…
MOBILE & MDM CONFIGURATION REVIEW
Mobile Device Management (MDM) systems, provide a configuration policy to your company’s mobile devices. Mobile devices can contain company emails, sensitive documents, login information and other data.
A mobile device compromise or theft can have the same impact…
FIREWALL CONFIGURATION & RULESET REVIEW
A Firewall will often act as the gatekeeper for any organisation’s devices and services. The access control rules which are configured can determine what is accessible, both publicly and privately. The secure configuration of these devices is important part in ensuring both your network…
Fill in the form below and one of our security experts will respond within 24hrs.