Accueil SSI audit Configuration audit

Configuration audit

A configuration audit to prevent misconfigurations and reinforce the security of your Information System

Ensure the integration of your security mechanisms with configuration auditing

The configuration audit consists of analyzing the configuration of your equipment to verify the integration of security mechanisms and reduce the attack surface.

This assessment may be based on the manufacturer’s safety recommendations, ANSSI, CIS or an internal reference framework.

Interviews may be necessary to assess the relevance of the analysis to operational constraints.

Discover the benefits of a configuration audit

As Synetis is a PASSI-qualified company, the configuration audit can be carried out under this qualification as defined by ANSSI. This applies, for example, to the audit of a Restricted Diffusion network or a SecNumCloud qualification.

Rely on a rigorous, proven approach

After determining the configuration points to be assessed, the auditors compare the configuration of the audited equipment with the safety recommendations. This detailed analysis of configuration faults enables them to identify relevant metrics for risk assessment and treatment.

We carry out configuration audits of various bricks, both software as well as of your Information System.

In addition to relying on appropriate and recognized security standards (ANSSI, CIS), our approach is also based on feedback from our technical experts in charge of integrating security solutions.

We cover configuration audits for a wide variety of systems, including :

In a broader sense, Synetis also performs audits of telecommuting or work environments, based on a study of the configuration of a corporate workstation. The aim of this type of audit is to verify that the configuration has been hardened (according to state-of-the-art rules) and to identify any loopholes that could enable an attacker or malicious employee to gain elevated privileges.

This type of audit can also be complemented by a hardware auditwhich validates the choice of hardware and “low-level” configurations (Bios…).

Discover real-life examples of configuration audit work

Active Directory audit

Web server audit

Cloud audit

Are you planning an audit?
Pentest
Architecture
Configuration
Red Team
Social Engineering
Organizational and Physical
Source code

Incident response

CERT contact details

Mail: cert@synetis.com

Telephone: 02 30 21 31 04

USER ID : CERT SYNETIS

KEY ID : 2F6F A FE30 7877

PGP key fingerprint: 8D8ACAAC20557C7C1FF58332F6FA110FE307877

CERT Synetis is in the process of obtaining PRIS (Prestataires de Réponse aux Incidents de Sécurité) qualification from ANSSI (the French national agency for security incident response).

Incident response

CERT contact details

Mail: cert@synetis.com

Telephone: 02 30 21 31 04

USER ID : CERT SYNETIS

KEY ID : 2F6F A FE30 7877

PGP key fingerprint: 8D8ACAAC20557C7C1FF58332F6FA110FE307877

CERT Synetis is in the process of obtaining PRIS (Prestataires de Réponse aux Incidents de Sécurité) qualification from ANSSI (the French national agency for security incident response).

Contact our Audit team