Objectives :
The configuration audit is designed to evaluate the configuration of the PHP modules used on Apache and Nginx platforms. Thus, the configuration of these application blocks will be reinforced to cope with cyber attacks.
A set of 113 checkpoints will be treated when conducting a PHP configuration audit. Therefore, every facet of the application block will be evaluated.
So for example, we’ll address some of the checkpoints listed below :
- The limitation of “includes”
- The activation of “safemode”
- The deactivation of system functionality
- The deactivation of “global variables”
- The limitation of inclusion of remote files
- Session protection
- Database connection control
- The control of script execution
This computer security audit mission is reinforced by the implementation of analyses and recommendations targeting hardware and software architecture discovered within the audited platform.
Reports :
Configuration audit report, correction tools
Maturity :