While Penetration tests, and similar services, can give an accurate picture of how an asset appears to an external entity, mission critical systems require a more holistic assessment of their security.
IRM's Infrastructure Assessment service facilitates a comprehensive review of your device and server configurations to identify issues which normally would not be visible externally. We use a combination of automated toolsets and manual audits to carry out reviews in the following areas:
- Host Build Review: Reviewing the configuration of servers or workstations will reveal any flaws in the build process or weaknesses that exist in the currently accepted build standard.
- Firewall configuration review: A firewall is an integral part of any architecture. If poorly configured, however, it can be a liability. A review of firewall configuration (incorporating IRM's in-house developed PREFiRE tool to visualise rules in place) will highlight any deficiencies in the security of the firewall configuration.
- Network Device Configuration Review: Network devices are ubiquitous in today's enterprises. They are party to the flow of information through an organisation and hence have a pivotal role to play. A review of network device configuration will highlight any weaknesses that could lead to unauthorised access to network devices.
- IDS IPS Configuration Review: Security devices, such as intrusion detection systems, must be correctly configured in order to provide the best protection. A review of the IDS/IPS configuration will highlight areas of deficient configuration that could lead to attacks going unnoticed.