Configuration Audit

The configuration audit is based on a technical evaluation of information system component’s configuration to ensure that the security measures deployed comply with good security practices. Configuration audits can be performed on any type of IT element (network equipment, operating systems, software, applications, databases, etc.) using appropriate configuration analysis tools.
BEGONIA GROUP's audit approach is based on:
  • • ANSSI (National Agency for Information Systems Security)
  • • SANS (SysAdmin, Audit, Network, Security)
  • • CIS (Center for Internet Security)
  • • publishers' security standards as well as the state of the art auditee's specific business constraints.
Configuration audit objectives are:
  • – Assess the general security level of the audit scope.
  • – Compare the current configuration of the equipment to the best practices in terms of information system security.
  • – Define a technical action plan to harden the audited scope.
  • – Pass on best practices to similar environments.
At the end of the audit, BEGONIA GROUP will write a report detailing all identified vulnerabilities and recommendations measures to be implemented.

Client Login area