Build And Configuration Reviews
An asset following secure review guidelines leads to a significant decrease in attack surface early in the asset lifecycle. This proactive cyber security approach adopted by the business company helps in the extra mile, both by establishing security baselines and lesser incidents.
Let our secure configuration security reviews help you set a secure baseline.
Get in touch










What is a Build and Configuration review?
A build and configuration review, also known as a secure configuration hardening review, involves reviewing the underlying Operating System and related components such as firmware, removable media interfaces in line with good security practices.
At times, customers request such reviews in comparison with CIS, NIST or internal guidelines. This is a white box pen test exercise performed to fully deliver knowledge of the system infrastructure.
A server with a lack of hardening or misconfiguration issues could provide a point on an easy route in developing network compromise or unauthorised access to sensitive details.
A weakly configured infrastructure may not only add vulnerabilities to the network, but a rootkit or a backdoor configured into the machine may go undetected for months.
This review helps to fill and discuss identifying weaknesses in a configuration to help you remediate issues in line with best practices.

Why do you need security hardening ?
A proactive security strategy defines controls in layered fashion. It is always better to embed security mindset early in the asset lifecycle. There is no cheaper, effective and better ROI than secure hardening reviews. Regular security hardening assessments ensure weak security settings, hardening issues and data protection weaknesses are identified early.
Before any new builds o network configurations are rolled into the production environment, it is important to release secure builds and provide for network configuration review or security validation to keep the attack surface to a minimum.
Having a configuration security review based benchmarking process in place ensures that vulnerabilities are reduced to minimum at the start of the asset lifecycle. Should your requirements mean looking around entire estate, read more about our full range of penetration testing services.

Benefits of Secure Configuration Review
- Protect your assets early in the asset lifecycle
- Follow a proactive approach to cyber security best practice
- Demonstrate security by design mindset to your business and supply chain
- Service quality underpins everything we do
- One time reviews improve your internal build methodology
- PCI DSS, ISO 27001, GDPR Compliance support
See what people are saying about us

Excellent people to work with.
Very good knowledge of requirement and give us correct findings with excellent remedy to improve our security for our B2B portal site.
Harman was great, really knowledgeable
Harman was great, really knowledgeable, helpful and on hand to answer any questions. The final report was very clear providing the technical information in an easy to read format which could be understood by the leaders of the business.
My experience of the team was 5 star.
They were so helpful, and their technical delivery and client communication were excellent.
Extremely satisfied
Extremely satisfied with approach, speed and end results. Thanks.
What is a build review?
Build review is the process of examining a software build to ensure that it meets quality standards. The purpose of build review is to catch any errors or problems with the build before it’s released. This can help prevent issues from occurring in production and can save time and money by catching problems early on.
Build and Configuration Reviews Methodology
A secure review involves assessing the operating systems, databases, devices or network equipment. It involves configuration and analysis phase followed by reporting as per the agreed form. Unlike penetration testing that involves security review from the surface, based on the running services, build review and configuration reviews explore the specific host’s configuration for instance, mobile devices, network devices, firewall configuration or any other assets.
Our team is committed to ensuring, that as our customer, you receive the utmost value out of our team consultancy services and look forward to developing a long-lasting business company relationship with you. Our secure configuration reviews project are aligned with the best practice in the world in each area including the following secure hardening standards:
Why build reviews are important?
The importance of a build review can’t be overstated. By conducting a regular build review, you can ensure that your software builds are of high quality and meet your standards. This can help prevent problems from occurring in production, which can save time and money. In addition, build reviews provide an opportunity for team members to collaborate and share knowledge.
- the codebase
- the build process
- the test suite
- the release process
- Knowledge of vulnerabilities
- Shorten potential downtimes
- Uncover potential cyberthreats
- Reduce mistakes on future deployments
- Ensure proper configurations
- Improved security posture
Build and configuration review test cases
Security vulnerabilities across networking, security, telecommunications & other internal equipment, OS and endpoint vulnerabilities.
Effective patch management plays critical role in closing window of opportunity for attackers, thats between the vulnerability disclosure and patch release.
Group Policy allows administrators to define security policies for users and the servers within the network. These policies are administered from a central location exclusively to the Windows operating system. The policy settings generally, among other things, enforce password settings, external media access, network-level access, patching schedule and application restrictions.
The best practices based group policy would ensure a safer network for an organisation and minimise the attack window for a threat actor to gain unauthorised access.
Logging and monitoring controls are reviewed to identify flaws in event collection, analysis and threat identification.
Full disk encryption is a cryptographic method that applies encryption to the entire hard drive including data, files and software programs. In an adverse case, if a device/server is stolen or unauthorised physical access is achieved, this could be disastrous for a company. A threat actor would gain access to sensitive information such as personably identifiable information (PII) or proprietary information stored on this device due to a lack of disk encryption.
Your network devices or servers BIOS or UEFI Firmware offers the ability to set lower-level passwords. These passwords would restrict people from booting the server, booting from removable devices, and changing BIOS or UEFI settings without administrators permission.
The nature of security vulnerabilities and threats is one of constant evolution; growing in sophistication and changing in order to exploit new vulnerabilities and evade detection.
This is why you need to perform regular secure configuration reviews and security assessments to protect your network devices, device configuration, firewall configuration, security systems and mobile devices.
Authentication is a fundamental component of ensuring cyber security controls for most of the assets.
Based on our methodology and scope of the job, we perform two types of password reviews which include password policy reviews and a password cracking exercise followed by statistical analysis to find out the complexity & character patterns in use.
A vast majority of cyber attacks take advantage of known software and hardware vulnerabilities. Unpatched software including Operating System (OS) and third-party applications can attract malicious code to the vulnerable servers. Software patching can act as a defensive armour that repels malicious attacks and protects your organisation against multiple exploits. This finding is tested during penetration testing and build reviews.

Build Reviews - Server and laptop security configuration
- Operating Systems security review
- Account Lockout Policy
- Privilege Management
- Audit Policy
- User password policy
- Patch Management
- Logging and Monitoring
- Secondary services and configurations
- Insecure Service / File System Permissions
- Network security policies
- Network and Host firewall restrictions
- Software Restriction and Application Control Policies

Our Pentest Engagement Approach
RecentBlog Entries
CREST and CHECK Penetration Testing Explained – Which is Right for Your Business?
It’s not wrong to say that CHECK and CREST are two of the most widely-used internationally recognised UK-based pen testing benchmarks, helping organisations identify vulnerabilities …
Your guide to CREST vulnerability assessments
Vulnerability assessment exercises help organisations identify vulnerabilities in their systems before threat actors can take advantage of them and also provide risk mitigation to reduce …
What is a CREST-approved provider, and why choosing a CREST-certified company is important?
Choosing the right cyber security service provider is essential for any business. But with so many providers, knowing which one to choose can be difficult. …
