Configuration review. Identifying flaws within equipment and software

Configuration review
Risks‬ :

A computer network attacker regularly seeks defects in a site’s configuration, a server, or a laptop to get into the company’s computer network.

Objectives :

The audit of computer security configuration is aimed at several specific points‬ :

  • Discovering the configuration inaccuracies in database or web servers.

  • Identifying problems due to the obsolescence of certain embedded software (“firmware”) meant for the management of routers and other computer network components.

Therefore a true “revision” of the configuration files and the rules implemented in numerous information system components (router, Firewall, IDS, HTTP, etc.) can be achieved.

Each of these information system blocks will be hardened to deal with the most commonly encountered cyber attacks in a corporate network.

Note: The blocks presented in the categories of web service, modules, and database introduce the technologies that we have capitalised on and created specific audit tools.

Reports‬ :

Configuration audit report and correction tools

Maturity‬ :

This mission is in the standardization phase within our company.

  • Discover the other existing maturity levels in our catalogue.‬
4a