A Security Configuration and Architecture Review enables you to know if your network architecture and the configuration of its components are compliant with the industry best practices and security recommendations.
It will allow you to answer, among other things, the following questions:
Above Security’s security architecture and configuration reviews provide a detailed analysis of the security architecture of your network, including network topology, installed components, device properties, configurations, information exchange protocols, allowed services, etc. Our certified consultants also evaluate remote access safety policies, network segmentation, server protection, authentication procedures, firewall designs, detection of intrusion system designs, as well as demilitarized zones (DMZ). The review includes a procedure for the configuration conformity verification of various assets, such as database servers, Web servers, workstations, firewalls, routers etc., all while using the best security practices.
A configuration and architectural review applies to the various informational assets such as:
The deliverable is a detailed report summarizing the current configuration of your servers as well as the architecture of your IT network, and recommendations of countermeasures and enhancements to enhance your security posture.