Penetration Testing

Configuration Reviews

A configuration review will provide a detailed insight into the security configuration of your software products, ensuring all the relevant security features are enabled and correctly configured. Where applicable, these will be aligned with an internationally accepted standard such as those produced by the Center for Internet Security.

Contact
Contact

Get in touch

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Configuration Reviews

Products are often implemented but not configured to optimise security by default, and if misconfigured, additional vulnerabilities can be introduced, leading to potential compromise. Our expert team will ensure that your infrastructure is as robust and running as efficiently as possible by looking at the bigger picture when it comes to installing new operating systems, network devices, products or other components.

North Star has a highly trained, qualified team to facilitate these build and configuration reviews, routinely conducting Amazon Web Services (AWS), Microsoft Office 365, firewall and gold build image reviews to various industry sectors and business sizes. On completing the review, detailed feedback and recommendations are provided to allow you to plan for any remedial actions required and have a thorough understanding of your current security risks.

Configuration Reviews
APproach

What we do

Features

Features of this service

Slider Arrow LeftSlider Arrow Right

Reduce risk

The risk of the network device compromise and subsequent loss of revenue and productivity and Implement best practices to take your security posture to the next level.

Non-intrusive

If you’re starting to take cyber security more serious but concerned about a robust penetration test, with the potential to reveal numerous vulnerabilities. Configuration reviews are very specific tests that will harden your security posture before taking on a more active test.

Pro-Active

Identify weaknesses that present a risk, and remediate them before they become a problem rather than once they have occurred. Adding essential defence in depth to your organisation as a whole.

Optimisation

Verify and improve the operating condition and the effectiveness of your security configuration and rule sets.

Baseline

Even the best IT team will miss valuable settings to optimise security with ever-evolving technology without a standard configuration or baseline.

Cost-effective

Review gold builds and standard configurations before implementing them across your estate. This will save time and resources in the future they are not in line with best practices.

Methodology

How we work

1
Contact

Get in touch and speak with one of the team.

2
Strategy

Strategic scoping call with our leading technical advisor to find out your exact requirements

3
RoadmaP

Tailor a roadmap to exactly what you need. We look to partner with our clients and be the trusted advisor they need

4
Onboarding

Our onboarding process is streamlined and smooth to ensue there is little to no disruption to your service

5
Continuous service

Your continuous security plan will give you the confidence in your security trusting an accredited professional partner is on hand 24/7

APproach

How we do it

Pre-Engagement

North Star will engage with the client to determine their requirements and ensure that the engagement is correctly scoped to deliver on those requirements and make sure all of the correct legal requirements are satisfied.

1
Pre-Engagement

North Star will engage with the client to determine their requirements and ensure that the engagement is correctly scoped to deliver on those requirements and make sure all of the correct legal requirements are satisfied

1
Reconnaissance

This phase helps obtain information about available services, potential versions of the services and get a general understanding of the environment that will be tested

1
Threat Modelling

Using all of the information gathered in the reconnaissance phase, North Star will determine where the potential risk of exploitation lies and create a plan to verify those findings

1
Exploitation

During this phase, and as agreed with the client in the pre-engagement phase North Star will attempt to exploit any vulnerabilities or misconfigurations identified in the previous phases to confirm that the risk exists

1
Post-Exploitation

Depending on the agreed approach for exploitation, North Star may also attempt to gain further access from the compromised host(s) further into the client’s network or attempt to obtain sensitive information

1
Reporting

As with all of North Star services, we will provide detailed expert advice in our report to help align your infrastructure with industry best practice security standards

1
Clean-up

As far as is possible, the systems tested will be returned to their pre-test state to remove any uploaded files or elevated accounts that were created

1
CUSTOMERS

Our Happy Customers

Phone And Credit Card

From a business perspective, North Star provide an efficient, thorough, and cost-effective security service which has benefitted thinkmoney considerably over the course of the last year.

Glenn Sproule
CISO thinkmoney
thinkmoney

From a business perspective, North Star provide an efficient, thorough, and cost-effective security service which has benefitted thinkmoney considerably over the course of the last year.

Glenn Sproule
CISO, thinkmoney
SSE Utilities Solutions

Their knowledge in the subject matter was excellent and I found them easy to engage, personable and approachable.

Ian Cheshire
Enterprise IT Lead Solution Architect, SSE Utilities Solutions
Connected Tech Group

It’s really refreshing to work with experts who act as an extension of our team. North Star don’t stop at identifying issues, they are happy to work with us to solve them too.

Andrew Cockayne
CEO, Connected Tech Group
Pickfords

If you are looking for a company to really deliver on the service they are offering, I would look no further. Very quick and easy process. They completed the report within a tight timeframe and offered plenty of helpful advice!

Waseem Akram
Group IT Manager, Pickfords

Let's talk

We’re here to help! Submit your information or call the office on +44 (0)1243 670 854 and a member of our team would be happy to help.

Who is North Star?
How can we support your business?
Why work with us?

Send us a message

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Email Icon
Contact

Contact us

Please get in touch using the form below
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.