Foundstone Host Security Configuration Assessment evaluates the security of your company’s critical servers, the backbone of your technology infrastructure. We analyze the operating system and application-level security issues of your company’s operating environments. Foundstone checks administrative and technical controls, identifies potential and actual weaknesses, and recommends specific countermeasures.
Host Security Configuration Assessments are critical because they allow us to identify vulnerabilities that cannot be detected through network assessments. These assessments are the most efficient mechanism to comprehensively evaluate the security of your organization’s critical assets.
Foundstone performs Host Security Configuration Assessments for Microsoft Windows and UNIX environments, including important applications such as IIS, SQL Server, and Apache. We also perform configuration assessments of routers. Foundstone has performed hundreds of Host Security Configuration Assessments for systems in production environments, including e-commerce web servers, financial databases, and Internet-facing bastion hosts. We have compiled a comprehensive set of audit points based on our experience with penetration testing as well as industry standards such as the CIS benchmarks.
Our knowledge base stays current with emerging technology, so that our Host Security Configuration Assessment checks for the latest security patches and configuration methods for the newest applications and servers. Our experienced consultants accurately determine where the highest-risk problems occur and how to address those issues at a policy level. Finally, our techniques use customized scripts that can be run by your administrators to collect data for assessment.
Foundstone’s methodology is created from established public guidelines and our consultants’ experience. Foundstone has developed tools to automate the collection of data. We use these scripts to help identify high-risk misconfigurations or omissions in your company’s server builds. Drawing from our experience, we test the overall risk of the host, rather than just check off a list of specific vendor-recommended points. As a result, we are able to identify the controls that most need improvement to reduce the risk faced by the host.
We thoroughly check the adequacy of security controls on the features and functions listed for numerous operating systems and devices, including:
Microsoft Windows and UNIX Hosts
We create a measurement of risk that is comparable between different operating systems and applications. Each host is measured against the security practices from our methodology:
Host Application Assessment — Web & Database Servers
Foundstone also assesses the installation and configuration of major applications such as Microsoft IIS and SQL Server. These applications often represent a high risk to the network because of their history of vulnerabilities and Internet connectivity. These assessments include in addition to the above, a review of:
Router and Switch Host Assessment
These assessments begin with the methodology described above to assess the configuration of the underlying host. Additional checks are performed to assess the particular function of the router and switch. The methodology targets high-level concepts by tracking the following specific, detailed points:
Foundstone’s methodology not only points out specific areas that should be addressed to reduce a host’s risk exposure, it also provides recommendations for how to bring up the baseline for deploying servers. These risk-reduction recommendations protect the system from known vulnerabilities and often eliminate exposure to zero-day exploits, which reduce the scope of a compromise.