top of page
3d-modern-techno-background-with-particles-with-shallow-depth-field.png

Services

audit.png
Microsoft 365 & Cloud Security

This section includes a comprehensive review of Conditional Access Policies (CA), including location-based rules,

multi-factor authentication (MFA) enforcement, and legacy authentication controls. We assess risky sign-ins, service

accounts, compliance device policies, and Entra ID Protection. Audit logs and unified logging settings are evaluated.

Configurations are compared against CISA’s Microsoft 365 security baseline across Defender, Entra ID, Exchange

Online, SharePoint, OneDrive, and Teams. Alerts and health check configurations are also reviewed.

Domain & DNS Security

Includes analysis of DNS record configurations (SPF, DKIM, DMARC), WHOIS data, SSL certificate expiration, and

DNSSEC implementation to ensure domain and email infrastructure integrity.

Network Infrastructure Security

Covers open port scanning, service exposure analysis, network segmentation practices, VPN and remote access

configurations, and the configuration of intrusion prevention systems, DDoS protection, SSL inspection, and URL

filtering. Patch management for network hardware is also assessed.

Vulnerability Management

Assessment includes internal and external vulnerability scanning using industry-recognized tools, identification of

unpatched systems, and validation of patch management processes.

Endpoint Protection

Focuses on antivirus policy compliance, deployment of Endpoint Detection and Response (EDR) tools, Mobile Device

Management (MDM) usage, and enforcement of Bring Your Own Device (BYOD) policies.

Access Control & Identity Management

Evaluation of password policies, role-based access control (RBAC), least privilege principles, dual approval

mechanisms, and Privileged Access Management (PAM) or just-in-time access controls.

Data Protection & Compliance

Analyzes data classification, labeling, and protection strategies. Reviews Data Loss Prevention (DLP) policies and

evaluates compliance with privacy laws such as GDPR and CCPA.

Dark Web Monitoring

Includes search and reporting of compromised credentials associated with the organization across dark web

databases using tools like HaveIBeenPwned or DarkWeb ID.

Incident Response

Analysis of incident detection, investigation, and response procedures. Verifies the existence of IR playbooks,

runbooks, and SOC integration.

Disaster Recovery & Business Continuity

Assessment of documented DRP and BCP strategies, frequency of test execution, and gap analysis in critical

services coverage.

Security Awareness & Training

Evaluation of cybersecurity awareness training programs and phishing simulations to measure employee vigilance.

Backup & Recovery

Review of backup policies, encryption, retention periods, and effectiveness of restore operations.

Certificate & Key Management

Inventory and analysis of certificates in use, expiration timelines, and validation of trusted certificate chains.

Reporting & Documentation

Includes a consolidated final report, categorized by findings and recommendations. Each issue is rated by criticality

(High / Medium / Low). A checklist of required inputs and system access is also provided before audit initiation. The

offering also differentiates between free and premium audit components.

Need more details? Contact us

We are here to assist. Contact us by email or by phone.

​

bottom of page