Skip to main content

Endpoint Hardening Configuration Review

Updated over 5 months ago

Service Overview

The organizational template image for servers and workstations, usually known as Golden Image, is a key element to continuously review and improve due to its wide distribution and immediate exposure to cybersecurity attacks. A strict and iterative hardening process is required to minimize the attack surface of the different endpoints.


Methodology

The assessment includes:

  • Initial image analysis for workstations and servers (2 main images) to identify misconfigurations and cybersecurity vulnerabilities

  • Development of a hardening action plan

  • Annual policy review to address emerging threats and evolving offensive trends


Deliverables

  • A detailed report highlighting security gaps and misconfigurations for each Golden Image


Prerequisites

  • One deployed endpoint of each type with standard organizational settings and local administrator access

  • In Windows environments using Microsoft Endpoint Manager (formerly Intune), Global Reader permissions are required


Customer Engagement

The client must provide a designated point of contact with access to relevant technical information throughout the engagement


Relevant Standards

The review is based on Center for Internet Security (CIS) benchmarks. Recommendations are tailored to the endpoint’s role and purpose.


Security Domains Covered

  • Cross organization policies, procedures and governance

  • Servers, network equipment and endpoints security

Did this answer your question?