Build and Configuration Review

What is a build and configuration security review?

An insecurely configured network could give attackers an easy route into your organisation. Commissioning a qualified ethical hacker to conduct a build or configuration review helps to reduce this risk by identifying security misconfiguration vulnerabilities across web and application servers, web frameworks, and devices such as routers and firewalls.

Incluzion Business Solutions’ CREST-accredited penetration testing team has extensive experience of providing build and configuration review services to help identify and address weaknesses.

The importance of regularly assessing system configurations

The fast pace of business growth and digital transformation means that it’s important to ensure your organisation’s cyber security keeps up. New systems, applications and devices can introduce security risks that could lead to an attacker gaining a foothold on your network and accessing critical data and assets. Many devices have weak out-of-the-box settings.

What we review

  • Password policies
  • Cloud configurations
  • Security systems
  • Access management
  • Operating systems
  • Applications
  • Wired and wireless network settings
  • Data storage

Our review process

A build and configuration review pen test systematically assesses devices, operating systems and databases across your networks. A typical engagement from our ethical hacking experts involves:

1. Data Collection

Our whitehat hackers use a combination of automated tools and manual processes to gather information about your network assets and how they are configured.

2. Configuration Analysis

Our build and configuration security team identify vulnerabilities by systematically analysing information collated across your network and comparing it to established baseline settings.

3. Reporting

Once an assessment is complete, we deliver a formal report and debrief outlining key findings and a prioritised list of remedial actions to help address any identified risks and exposures.

Are you experiencing a cyber attack?

We are trusted by global cyber insurers to conduct thousands of breach investigations
every year. Our experts can help you contain, recover and mitigate future attacks.