Contact Us
Contact Us
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Subscribe to our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Server Build Review

An unhardened or weakly configured server could provide an easy route to a complete network compromise or unauthorised access to sensitive data

Read more
Complete this form to get in touch

Are you happy for Defendza to keep you informed on the latest developments in cyber security (attack reports, guidance, DIY articles)? Of course you can unsubscribe at any time. Please see our privacy policy

Want to talk? Call us:    0203 916 5444
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Overview

Before any new builds are rolled into the production environment, it is important to release secure builds to keep the attack surface to a minimum. Having a secure build configuration process in place ensures that vulnerabilities are reduced to minimum at the start of the asset lifecycle.

Why you need Server Build Review?

A weakly configured build may not only add vulnerabilities to the network, but a root kit or a backdoor configured into the machine may go undetected for months. This review helps in identifying weaknesses in configuration that may allow unauthorised access to the underlying operating system.

Methodology

Reporting

The assessment-execution phase is followed by the analysis & reporting. Defendza performs analysis on the testing output, evaluates the risk impact and likelihood of exploitation in realistic scenarios before providing action plans to remediate the identified risks. All our reports address business as well as the technical audience with supporting raw data, including mitigation measures at strategic and tactical levels. 

A fresh set of eyes

No one doubts the talent and commitment of your in house administrators and developers, or the great work they’re doing. But, by having a third party come in and perform an independent cybersecurity audit and review of your systems, you can ensure that no stone is left unturned. Our team of skilled cybersecurity experts will help to identify any vulnerabilities and weaknesses your team may have missed.

Consolidate your cyber security strategy

The information gained from our security assessments and cybersecurity audits will form the basis of a cybersecurity strategy that you can rely on to protect your network. You can update your practices, employee awareness, processes, and technology to match the new threats and evolving cybersecurity landscape.

Patching

As part of the audit, we review the device operating system and version in use. We review the patching policy and if the device under review is part of this policy as well.

A patch management policy is important for keeping your system's security regularly updated. Patch management involves obtaining, testing, and installing several patches to the computer system to keep it safe against malware attacks. The tasks carried out during patch management include: keeping up to date on which patches are available, determining what patches are right for your system, making sure that these patches are properly installed, testing your system after installation, and documenting all related procedures.

Review Services

We analyse the underlying device for excessive and unnecessary services, default access credentials, management services (such as Telnet and SSH), and general configuration.

As a security best practice, any unnecessary service must be disabled. These unneeded services, especially those that use User Datagram Protocol (UDP), are infrequently used for legitimate purposes but can be used to launch DoS and other attacks that are otherwise prevented by packet filtering.

Protect yourself against evolving threats

The nature of cybersecurity threats is one of constant evolution; growing in sophistication and changing in order to exploit new vulnerabilities and evade detection. This is why you need to perform regular security assessments to protect your network.

Bios / Boot Security

Your servers BIOS or UEFI Firmware offers the ability to set lower-level passwords. These passwords would restrict people from booting the server, booting from removable devices, and changing BIOS or UEFI settings without an administrators permission.

Disk encryption

Full disk encryption is a cryptographic method that applies encryption to the entire hard drive including data, files, the operating system and software programs. In an adverse case, if a device / server is stolen or an unauthorised physical access is achieved, this could be disastrous for a company. A threat actor would gain access to sensitive information such as personably identifiable information (PII) or proprietary information stored on this device due to lack of disk encryption. 

Group Policy Settings Review

Group Policy allows administrators to define security policies for users and the servers within the network. These policies are administered from a central location exclusively to the Windows operating system. The policy settings generally, among other things, enforces password settings, external media access, network level access, patching schedule and application restrictions.

A well configured group policy would ensure a safer network for an organisation and minimise the attack window for a threat actor to gain unauthorised access.

User Accounts & Privilege Level Check

A privileged user account has unlimited permissions to systems or data stored on a network. A person with a privileged account is in a position to make changes to system configuration, read / modify sensitive data and grant access to business critical areas to other users (including create additional accounts). A privileged account within an organisation fall under the following types:

  • Domain administrator
  • Local administrator
  • Service accounts
  • Business privileged user accounts

Build review would identify list of user accounts and their privilelges, making the business aware of the threat a server is exposed to.

OS & Third-Party Patch Check

A vast majority of cyber attacks take advantage of known software and hardware vulnerabilities. Unpatched software including Operating System (OS) and third-party applications, can attract malicious code to the vulnerable servers. Software patching can act as a defensive armor that repels malicious attacks and protects your organisation against multiple exploits. 

Lets talk about your security requirements 
Call Us Now

Why Defendza ?

Thorough Analysis and Reporting

Our reports are comprehensive and include all the evidence that supports our findings. We give you a risk rating that considers how likely an attack is as well as the impact it could have. We don’t create panic scenarios. Our mitigation is detailed, covering both strategic and tactical areas to help our clients prepare a remediation plan.

Custom tools and scripts

Apart from the range of commercial and open source tools available for specific testing, our team has its own custom scripts for efficient testing. We provide accurate results to make sure our clients completely understand any vulnerabilities we report.

In-house experts

Our teams are led by veteran security consultants accredited by CREST standards for the last several years. Our experience shows that our clients are best served by giving them the right advice for their cyber security needs. We do not believe in spreading fear, uncertainty and doubt to generate more business.

Key Benefits

Our network security team is waiting
Call Us Now

Testimonials

"My experience to date with Defendza has been very positive, I look for a flexible, knowledable security "partner" when I engage a PT firm. Pentest means many things to many people and there are many different use cases for both the testing activity and the report generated and I need someone to work with me to get the absolute best value out of my security budget."

Information Security Officer
Insurance Group

Excellent people to work with. Very good knowledge of requirement and give us correct findings with excellent remedy to improve our security for our B2B portal site."

Head of Technical & Business Improvement
Leading Pharmaceutical Manufacturer

"I thought it was a highly professional and thorough exercise and I would have no hesitation recommending Defendza to any of my connections."

Director, Software Engineering
Global Information and Analytics Company

"Good personal service. We are delighted with the work Defendza did for us. Highly recommended."

CTO
Manchester headquartered Global Fashion Brand

"Extremely satisfied with approach, speed and end results. Thanks."

COO
International fashion label and store

"My experience of the Defendza team was 5 star.  They were so helpful, and their technical delivery and client communication were excellent."

Director, Software Development
Corporate Services Company

"Harman was great, really knowledgeable, helpful and on hand to answer any questions. The final report was very clear providing the technical information in an easy to read format which could be understood by the leaders of the business. Really enjoyed working with Defendza and look forward to working with them again in the future. Thank you!

IT manager
Housing Trust

Resources

Manufacturers Can’t Afford the Cyber Risks

09/06/2019

Much of the manufacturing industry has failed to take proactive steps to defend against cyber attacks—which is a notable problem considering the growing threats the industry faces