The security of an information system is closely related to the quality of the configuration of the elements belonging to this information system. This is the reason why we propose compliance audits (also called configuration audits), that allow to estimate the level of security of your information system based on the configuration of your technical components.
Those latters can be operating systems, middlewares, application servers or framworks. During those audits, our experts examine those elements in order to pinpoint any potential security flaws that misconfiguration could lead to.
As opposed to pentests, during compliance audits, our auditors will have access to all the necessary information: administrator account, detailled infrastructure map, as well as all the necessary technical details/documentations. The audit can be decomposed into 4 main phases:
We can realize compliance audits with respect to following reference frameworks:
We help you evaluate the risks that are cast on your systems, and establish a plan in order to deal with these risks.
We accompany you towards ISO 27001 certification, from the faisability study to the exam, and then to its maintenance.
Specialists in information security and pentest in Lyon, Paris, Saint-Etienne and throughout France
You've enabled "Do Not Track" in your browser, we respect that choice and don't track your visit on our website.