A build configuration security review can provide system administrators with a comprehensive overview of the security of their assets, whereby the local policies and settings of a device are examined to assess their security implications.
Who is it for?
Build configuration reviews can assess server builds, end user device builds, or standardised images used for deploying systems (commonly known as “gold images”) for security issues and to review their level of security hardening.
Therefore, most organisations would benefit from a Build Configuration Security Review to ensure their servers and end user devices are as secure as they should be.
How can we help?
This form of assessment is not intended to be representative of a real-world threat, but instead a transparent approach to allow you to gain an understanding of the security-related configurations, and how this may hinder defence-in-depth.
We review the security configuration of devices and give guidance on how systems can be reconfigured to make them more resilient to attacks, including remote attacks, local network attacks, and insider threats.
What we test
We assess all aspects of the device configuration; some commonly assessed areas include:
Local Configuration - The local configuration considers hardening options available on the operating system and device. Such as registry keys, file-system permissions, and BIOS settings.
Domain Configuration - The domain configuration includes any policies or configurations applied as a result of being a domain-joined asset, such as group policy and account lockout options.
Network Configuration - The network configuration includes any policies or configurations which impact the security of the asset from the local-area network such as host firewall configuration and protocols such as NetBIOS.
Software Configuration - The software configuration includes any software installed on the host which may impact the security of the asset such as outdated browsers, office packages, and protections such as Anti-virus.
Want to know more about how a build configuration security review could benefit your organisation? Get in touch with one of our experts today for more information.