About
Prior to going live with a new system, Pākiki can review the configuration of the servers/infrastructure to ensure that appropriate security controls are in place, and to identify if it is likely that an attacker could get privilege escalation on a system if it were to be compromised. Additionally, before deploying a new image to endpoints, Pākiki can review it to ensure that appropriate security controls are in place to prevent common attacks.
How we can help
Pākiki can carry out configuration reviews of servers, desktop and some networking hardware. The particulars of the review will depend on the type of device, and your requirements, but the review could include:
- A review to ensure that all reasonable built-in security controls are enabled and configured appropriately.
- Practical attempts to identify and/or exploit privilege escalation paths that an attacker may use if they were to compromise the system.
- Reviews against particular benchmarks or standards.
Get in touch
We’d love to hear more about your project, and to discuss how we can help.