Build assessments

Build assessments / configuration reviews look at the configuration of a standard system build to ensure that appropriate security controls are in place.

We seek to identify vulnerabilities with the operating system and core security applications, such as disk encryption and anti-virus. We perform the review from several perspectives to assess the risks faced from different threats, for example:

  • from the perspective of someone finding or stealing a laptop who has no credentials
  • from the perspective of a normal user who doesn’t have administrative access to their laptop, including attempts to escalate privileges
  • from the perspective of a user who has administrative access

Our build assessments / configuration reviews include investigations into stored credentials, and the possibility of establishing a VPN session.