MYTH
A normal security program will incorporate vulnerability scans and penetration tests to help measure the effectiveness of their security controls, but oftentimes doing a more detailed review of their key security technology/devices is overlooked. The most important of these security devices/technology is usually the firewall/endpoint security / WAF / AWS / Azure / GCP. A configuration review takes a deeper dive into the configuration of this critical aspect of security, uncovering issues and deficiencies that may not be apparent through traditional security testing.
Securing the “Security Perimeter” of Your Organisation
Firewall is said to be the primary line of defense for an organization’s network infrastructure. But this line of defense has its own set of weaknesses, that, if not addressed could cause havoc in the network environment. A few common weaknesses seen in the security perimeter are stated below, but are not confined to just these: