This website uses cookies

To provide the highest level of service we use cookies on this site.
Your continued use of the site means that you agree to their use in accordance with our terms and conditions.




Configuration analysis takes an in-depth look at servers, databases, and devices to ensure the setup aligns with security best practices.

By identifying and rectifying security vulnerabilities and misconfigurations, the overall security of your IT infrastructure is significantly enhanced.

Key focus areas include:


Operating System Configuration Analysis

The analysis delves into a multitude of system checks including Network Services, Processes, and System Variables. Assessing available network services, verifying run processes, and system variables helps ensure they are all secure and optimized. Disk Space and Encryption refer to the separation of disk space and the encryption mechanisms employed which are analysed to ensure your sensitive data is adequately protected. Additional Security Mechanisms encompass a comprehensive review of security mechanisms, kernel-level security measures, jails, chroot, BSD security levels, host IDS, host firewall, file integrity checker, antivirus, and SELinux. System Updates and Scheduled Tasks imply that we verify if system updates are up to date and assess scheduled tasks for potential security risks. Logging System and Security in Boot Phase means we evaluate the logging system for any potential vulnerabilities and verify the server's security during the boot phase. OS Management and Shell Command History involve a review of the operating system management mechanism and shell command history to identify potential operational risks.


Database Configuration Analysis

A thorough review of your database configuration will include Hardening Mechanisms and Client Communication. Implemented hardening mechanisms are tested, such as default users, database partitioning, log storage, and unusual events showing in logs. Additionally, we test the cryptographic mechanisms used for client authentication and data transfer. Database Architecture and RDBMS Service involve a general review of database architecture including authorization mechanisms, authentication, privilege segmentation, views, and stored procedures. Moreover, we analyse RDBMS service on a network level for further insights into your database's security status.



What is Configuration Analysis?

Configuration Analysis is a process that involves a thorough analysis of servers, databases, and devices within an organization's IT infrastructure. The aim is to ensure that the configuration of these elements aligns with security best practices, in order to minimize vulnerabilities and bolster the overall security posture.


What issues can a Configuration Analysis reveal?


What are the benefits of a Configuration Analysis?


How much does a Configuration Analysis cost?


How is a Configuration Analysis performed?

Any questions?

Happy to get a call or email
and help!

Terms and conditions
© 2023 Securitum. All rights reserved.