A Secure Configuration Audit protects vulnerabilities against sophisticated, targeted long term attacks where hackers gain access to privileged systems and data. Even a zero day attack has less of a chance resulting in a security breach in a securely configured system. Leading technology advisory firm Gartner, considers configuration hardening an essential defense against targeted attacks.
Performing a secure configuration review provides visibility on:
User access control on systems
Password and account policies
Services and applications running on critical systems
The current set of missing security patches
A secure configuration audit checks every facet of your network for the vulnerabilities hackers exploit to gain access. This includes operating systems, your network, and databases.
Our comprehensive audit process gives you a comprehensive view of your security posture
The audit process begins with script execution as well as a manual collection of your current configuration settings.
We then continue by conducting a comparison of the script output or the manually collected settings against established Paladion baseline settings.
After the audit is complete we provide a safe/unsafe status check with detailed descriptions of unsafe findings and discuss those findings with administrators to better understand the client’s environment.
At the conclusion of the secure configuration audit, our team of experts provides a final report with detailed findings, a risk rating, and suggestions for mitigating risk.
We have support for close to 50 common platforms that include operation systems, web servers, network devices, and firewalls. In addition, our databases and configuration audit checklists and policies comply with CIS and NIST standards.
Copyright All Rights Reserved © 2020