A build configuration security review can provide system administrators with a comprehensive overview of the security of their assets, whereby the local policies and settings of a device are examined to assess their security implications.

Who is it for?

Who is it for?

Build configuration reviews can assess server builds, end user device builds, or standardised images used for deploying systems (commonly known as “gold images”) for security issues and to review their level of security hardening.

Therefore, most organisations would benefit from a Build Configuration Security Review to ensure their servers and end user devices are as secure as they should be.

How can we help?

How can we help?

This form of assessment is not intended to be representative of a real-world threat, but instead a transparent approach to allow you to gain an understanding of the security-related configurations, and how this may hinder defence-in-depth.

We review the security configuration of devices and give guidance on how systems can be reconfigured to make them more resilient to attacks, including remote attacks, local network attacks, and insider threats.

What we test

What we test

We assess all aspects of the device configuration; some commonly assessed areas include:

  • Local Configuration – The local configuration considers hardening options available on the operating system and device. Such as registry keys, file-system permissions, and BIOS settings.
  • Domain Configuration – The domain configuration includes any policies or configurations applied as a result of being a domain-joined asset, such as group policy and account lockout options.
  • Network Configuration – The network configuration includes any policies or configurations which impact the security of the asset from the local-area network such as host firewall configuration and protocols such as NetBIOS.
  • Software Configuration – The software configuration includes any software installed on the host which may impact the security of the asset such as outdated browsers, office packages, and protections such as Anti-virus.

Want to know more about how a build configuration security review could benefit your organisation? Get in touch with one of our experts today for more information.

Download our Fact Sheet

Download

Other services

Virtual Information Security Manager

Virtual Information Security Manager

Developing and maintaining a robust cybersecurity posture can be challenging for organisations who e...

Incident Response Scenario Testing (Wargaming)

Incident Response Scenario Testing

Modern organisations face a range of cybersecurity risks and whilst every effort may be made to prev...

Build Configuration Security Review

Build Configuration Security Review

A build configuration security review can provide system administrators with a comprehensive overvie...

Cloud Configuration Security Review

Secarma’s Cloud Configuration Security Review tests the configuration of the chosen cloud provider...

Cyber Security Maturity Assessment

Our Cyber Security Maturity Assessment (CSMA) evaluates your organisation's current security program...

Threat Modelling

Threat Modelling is a structured tabletop exercise which is used to identify and mitigate potential...

Firewall Configuration Security Review

Firewall Configuration Security Review

Firewalls are an essential component of network security as they monitor incoming and outgoing netwo...

IOT Cyber Scheme

IoT Cyber Scheme

Internet of Things (IoT) is a standard against which manufacturers of IoT devices can have their dev...