Configuration Review
Fortifying your security posture
Ensure your enviroments are resilient to cyber threats with our suite of configuration review services
Most Popular Enviroments
Microsoft Azure
Microsoft Office 365
Amazon Web Services
Google Cloud Platform
​Delta's team of experienced and certified security engineers are best placed to assist your business in conducting a rigerous review of your systems.
​
With over 30 years of hands on experience Delta will:
-
Review your services to identify misconfiguration, vulnerabilities and align to CIS Standards
-
Supply detailed reporting, covering prioritisation, impact and click-by-click remediation steps
-
Post-Test review with a certified engineer to support digestion of results
What is a Configuration Review?
Cloud-based services are essential in the modern business environment, making cloud service provider security testing crucial for safeguarding online infrastructure and vital business data.
Delta Cyber Security's Configuration Review services offer a thorough assessment of the security configurations across your IT infrastructure, encompassing areas such as; ​​​​
Storage Policies
Application Policies
Network Security Groups
Device Management
Misconfiguration
Identity & Access Management
Office 365
Security Review
-
Detect misconfigurations
-
Review:
-
Account and authentication policies
-
Application permissions
-
Data management policies
-
Email security configurations
-
Exchange online configurations
-
Storage policies
-
Auditing policies
-
Mobile device management policies
-
-
Detect misconfigurations in:
-
Account and authentication policies
-
MS Defender for cloud policies
-
Logging and monitoring
-
Network security
-
-
Securely configure:​
-
Storage policies
-
Database services
-
Compute services
-
Application services
-
Azure Cloud
Security Review
-
Detect misconfigurations in:
-
EC2 instances
-
Identify and access management
-
CloudTrail and CloudWatch logging
-
VPC and Networking
-
-
Securely configure
-
Storage policies​
-
Database services
-
Compute services
-
AWS Cloud
Security Review
Why are Configuration Reviews essential?
The majority of businesses now utilise Cloud services, which can lead to sensitive information being at risk due to vulnerabilities in 'out of the box' configurations.
Configuration reviews are a crucial tool in identifying IT configuration errors, enabling you to protect your Information and Communications Technology infrastructure.
​​
Benefits include:
-
Securing functionality across cloud enviroments such as Azure, O365, AWS & GCP.
-
Align configurations with security standards and industry best practices.
-
Protect against data breaches, financial losses and reputational damage.
-
Prevent outdated security software and performance degradation. ​
​
​
How are Configuration Reviews conducted?
Delta's certified security engineers meticulously evaluate your cloud infastructure configurations to optimise security and provide click-by-click actionable recommendations.
Each service includes a review call with the lead engineer to discuss findings and ensure that you extract the most benefit from the engagement.
Scoping
​You will be guided through a scoping process, via calls or forms, to establish the remit of the test
Pre-test Setup
Confirmation of testing dates and system access including pre-requisities
Testing
Testing commences and detailed reporting circulated upon completion
Post-test Review
Post test feedback call including recommendations on any improvements to bolster your security posture
Why Delta?
Delta configuration reviews are performed in accordance with recognised industry standards, including those developed by Center for Internet Security (CIS).
Where appropriate we will also leverage security recommendations provided by various recognised sources, such as the National Cyber Security Centre (NCSC), PCI Security Standards Council and application or device manufacturers.
​
Our technical experts have conducted a variety of roles within the MoD, including both defensive and offensive cyber operations and operated in consultancy roles for a range of security specialist organisations. By blending our real-world experience with recognised industry standards, we are well placed to furnish our clients with trusted guidance in enhancing the security posture of their systems, devices and applications.