Service Overview
The organizational template image for servers and workstations, usually known as Golden Image, is a key element to continuously review and improve due to its wide distribution and immediate exposure to cybersecurity attacks. A strict and iterative hardening process is required to minimize the attack surface of the different endpoints.
Methodology
The assessment includes:
Initial image analysis for workstations and servers (2 main images) to identify misconfigurations and cybersecurity vulnerabilities
Development of a hardening action plan
Annual policy review to address emerging threats and evolving offensive trends
Deliverables
A detailed report highlighting security gaps and misconfigurations for each Golden Image
Prerequisites
One deployed endpoint of each type with standard organizational settings and local administrator access
In Windows environments using Microsoft Endpoint Manager (formerly Intune), Global Reader permissions are required
Customer Engagement
The client must provide a designated point of contact with access to relevant technical information throughout the engagement
Relevant Standards
The review is based on Center for Internet Security (CIS) benchmarks. Recommendations are tailored to the endpoint’s role and purpose.
Security Domains Covered
Cross organization policies, procedures and governance
Servers, network equipment and endpoints security
