top of page

 Configuration Review
Fortifying your security posture

Ensure your enviroments are resilient to cyber threats with our suite of configuration review services

Most Popular Enviroments

Azure.png

Microsoft Azure

Microsoft_365_29.png

Microsoft Office 365

Amazon-Web-Services-AWS-Logo.png

Amazon Web Services

google-cloud-logo-v2.png

Google Cloud Platform

​Delta's team of experienced and certified security engineers are best placed to assist your business in conducting a rigerous review of your systems.

​

With over 30 years of hands on experience Delta will:

  • Review your services to identify misconfiguration, vulnerabilities and align to CIS Standards

  • Supply detailed reporting, covering prioritisation, impact and click-by-click remediation steps

  • Post-Test review with a certified engineer to support digestion of results

CIS_edited.jpg
Qualified Microsoft Azure Security Engineer
Certified Information Security Manager (CISM) Logo.png
Sponsors of The Cyber Scheme
Background person grey zoom in.png

What is a Configuration Review? 

Cloud-based services are essential in the modern business environment, making cloud service provider security testing crucial for safeguarding online infrastructure and vital business data.

Delta Cyber Security's Configuration Review services offer a thorough assessment of the security configurations across your IT infrastructure, encompassing areas such as; ​​​​

Storage Policies

database.png

Application Policies

server.png

Network Security Groups

Firewall tech v2.png

Device Management

nfc.png

Misconfiguration

Malware tech v1.png

Identity & Access Management

network.png

Office 365
Security Review

  • Detect misconfigurations

  • Review:

    • Account and authentication policies

    • Application permissions

    • Data management policies

    • Email security configurations

    • Exchange online configurations

    • Storage policies

    • Auditing policies

    • Mobile device management policies

Microsoft_365_29.png
  • Detect misconfigurations in:

    • Account and authentication policies

    • MS Defender for cloud policies

    • Logging and monitoring

    • Network security

  • Securely configure:​

    • Storage policies

    • Database services

    • Compute services

    • Application services

Azure Cloud
Security Review

Azure.png
  • Detect misconfigurations in:

    • EC2 instances

    • Identify and access management

    • CloudTrail and CloudWatch logging

    • VPC and Networking

  • Securely configure

    • Storage policies​

    • Database services

    • Compute services

AWS Cloud
Security Review

Amazon-Web-Services-AWS-Logo.png

Why are Configuration Reviews essential? 

The majority of businesses now utilise Cloud services, which can lead to sensitive information being at risk due to vulnerabilities in 'out of the box' configurations.

Configuration reviews are a crucial tool in identifying IT configuration errors, enabling you to protect your Information and Communications Technology infrastructure. 

​​

Benefits include:

  • Securing functionality across cloud enviroments such as Azure, O365, AWS & GCP.

  • Align configurations with security standards and industry best practices. 

  • Protect against data breaches, financial losses and reputational damage. 

  • Prevent outdated security software and performance degradation. ​

​

​

How are Configuration Reviews conducted? 

Delta's certified security engineers meticulously evaluate your cloud infastructure configurations to optimise security and provide click-by-click actionable recommendations.

 

Each service includes a review call with the lead engineer to discuss findings and ensure that you extract the most benefit from the engagement.  

Keyboard grey smaller.png

Scoping

number-one.png

​You will be guided through a scoping process, via calls or forms, to establish the remit of the test

Pre-test Setup

number-2.png

Confirmation of testing dates and system access including pre-requisities

Testing

number-3.png

Testing commences and detailed reporting circulated upon completion

Post-test Review

Image (1).png

Post test feedback call including recommendations on any improvements to bolster your security posture

Review and Protect AWS

AWS Configuration review services

Why Delta? 

Configuration reviews are to the recognised industry standards, including those of Center for Internet Security (CIS)

Delta configuration reviews are performed in accordance with recognised industry standards, including those developed by Center for Internet Security (CIS). 

 

Where appropriate we will also leverage security recommendations provided by various recognised sources, such as the National Cyber Security Centre (NCSC), PCI Security Standards Council and application or device manufacturers.  

​

Our technical experts have conducted a variety of roles within the MoD, including both defensive and offensive cyber operations and operated in consultancy roles for a range of security specialist organisations. By blending our real-world experience with recognised industry standards, we are well placed to furnish our clients with trusted guidance in enhancing the security posture of their systems, devices and applications. 

bottom of page