CONFIGURATION REVIEW
Verify Your Security with a CSG configuration review of your infrastructure
An insecurely configured network could give attackers an easy route into your organisation. Commissioning a qualified ethical hacker to conduct a build or configuration review helps to reduce this risk by identifying security misconfiguration vulnerabilities across web and application servers, web frameworks, and devices such as routers and firewalls.
CSG’s qualified penetration testing team has extensive experience of providing build and configuration review services to help identify and address weaknesses.
The fast pace of business growth and digital transformation means that it’s important to ensure your organisation’s cyber security keeps up. New systems, applications and devices can introduce security risks that could lead to an attacker gaining a foothold on your network and accessing critical data and assets. Many devices have weak out-of-the-box settings.
Firewall rule sets can quickly become outdated. CSG’s penetration testers can detect unsafe configurations and recommend changes to optimise security and throughput.
Password Policies
A build and configuration review pen test systematically assess devices, operating systems, and databases across your networks. A typical engagement from our ethical hacking experts involves:
Data Collection
Our white hat hackers use a combination of automated tools and manual processes to gather information about your network assets and how they are configured.
Configuration Analysis
Our build and configuration security team identify vulnerabilities by systematically analysing information collated across your network and comparing it to established baseline settings.
Reporting
Once an assessment is complete, we deliver a formal report and debrief outlining key findings and a prioritised list of remedial actions to help address any identified risks and exposures.