It doesn't matter how secure your software is, if the underlying operating system is not properly hardened, it's only a matter of time before this is taken advantage of to compromise the entire system. That's why we believe that a Secure Host Configuration Assessment is important, as it identifies vulnerabilities that cannot be detected through network-based testing.
Our Secure Host Configuration Assessment will audit your host security configuration against industry best practice standards such as the latest Center for Internet Security (CIS) benchmarks to ensure your hosts are iron-clad when it comes to security.
During the assessment, we will collect the current configuration of your hosts or Standard Operating Environment (SOE) and validate for each security domain, that the host is configured correctly accoridng to industry best practice standards.
We've developed tools to automate the collection of data, and use these scripts to help identify high-risk misconfigurations or omissions in your standard operating environment.
Each host is measured against the security practices from our methodology. We create a measurement of risk that is comparable between different operating systems and applications, and assess areas including: