First NIS 2 measures released — Discover the 20 security objectives from the ReCyF frameworkFirst NIS 2 measures released — Discover the 20 security objectives from the ReCyF frameworkFirst NIS 2 measures released — Discover the 20 security objectives from the ReCyF frameworkFirst NIS 2 measures released — Discover the 20 security objectives from the ReCyF frameworkFirst NIS 2 measures released — Discover the 20 security objectives from the ReCyF frameworkFirst NIS 2 measures released — Discover the 20 security objectives from the ReCyF framework

Operational Services

Configuration Audit

Verify your systems' compliance with security best practices

Why audit your configurations?

Configuration errors are one of the main causes of information system compromise. A configuration audit identifies deviations from security best practices and industry standards.

Key statistic

80% of successful attacks exploit configuration errors or unchanged default settings.

Audit perimeters

Active Directory

Complete audit of your AD environment

  • Architecture and topology
  • Password policy
  • Privileged and service accounts
  • GPO and delegations
  • Attack paths (BloodHound)

Azure/M365 Cloud

Security of your Microsoft Cloud environments

  • Entra ID (Azure AD) configuration
  • Conditional access and MFA
  • Microsoft 365 and Exchange Online
  • Azure RBAC and IAM
  • Microsoft Defender

Network infrastructure

Configuration of your network equipment

  • Firewalls and segmentation
  • VPN and remote access
  • Wi-Fi and NAC
  • Switches and routers
  • Load balancers and WAF

Systems and servers

Server hardening

  • Windows Server
  • Linux (RHEL, Ubuntu, Debian)
  • Containers and Kubernetes
  • Databases
  • Web services (Apache, Nginx, IIS)

Reference frameworks used

Our audits are based on industry-recognized frameworks

CIS Benchmarks
Center for Internet Security
NIST
National Institute of Standards
ANSSI
ANSSI Guidelines
Microsoft
Security Baselines
STIGs
Security Technical Implementation Guides

Our methodology

1

Collection

Automated extraction of current configurations

2

Analysis

Comparison with frameworks and best practices

3

Prioritization

Classification of gaps by criticality

4

Remediation

Detailed action plan with correction scripts

Harden your systems

Identify and fix configuration errors in your IS.

Request an audit