{"id":5531,"date":"2021-09-07T17:38:24","date_gmt":"2021-09-07T17:38:24","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5531"},"modified":"2021-09-07T17:43:55","modified_gmt":"2021-09-07T17:43:55","slug":"design-and-configuration-review","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5531","title":{"rendered":"Design and Configuration Review"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5531\" class=\"elementor elementor-5531\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-346f4b48 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"346f4b48\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-64cd2ab4 ot-flex-column-vertical\" data-id=\"64cd2ab4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-84ebd62 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"84ebd62\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-30300f58 ot-flex-column-vertical\" data-id=\"30300f58\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-61214bcc elementor-widget elementor-widget-text-editor\" data-id=\"61214bcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h4><strong>IDENTIFY WEAKNESS IN ARCHITECTURE<\/strong><\/h4><h6><strong>Build, improve and re-engineer your design to meet industry best practice<\/strong><\/h6><p>To identify any weaknesses inherent in the design of your security architecture, we will analyse the high-level system documentation focusing on the purpose of the system. To provide a customized risk assessment, we compare the security architecture design against both industry best practices and current attack vectors.<\/p><p>Once this has been completed, we may recommend building, improving, or reengineering your design to meet the following: organizational policies, industry best security practices and compliance standards (i.e. CIS, HIPAA, FERPA, GLBA\u00a0etc.),\u00a0legislation and\u00a0regulations.<\/p><p>An early design or configuration review in the system lifecycle process will enable your organization to minimize costs and prevent delays. A flawed design or implementation can increase the security risks and\u00a0can\u00a0have legal repercussions.<\/p><h4><strong>Outcomes<\/strong><\/h4><p>Unlike a software requirements specification, a security architecture review will clarify whether the design or configuration will prevent desired functionality, will cause unintended functions or will affect security controls. Our design and configuration reviews provide security best practice recommendations\u00a0for:<\/p><ul><li>Authentication<\/li><li>Cryptography<\/li><li>Information the system will hold (PII \/ PCI DSS) and how it is held<\/li><li>User roles and permissions<\/li><li>Interactions with external systems<\/li><li>Software and framework choices.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-45f97be9 ot-flex-column-vertical\" data-id=\"45f97be9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a29b2e8 elementor-widget elementor-widget-image\" data-id=\"a29b2e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"598\" height=\"450\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/datas.jpg\" class=\"attachment-large size-large wp-image-2292\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/datas.jpg 598w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/datas-300x226.jpg 300w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IDENTIFY WEAKNESS IN ARCHITECTURE Build, improve and re-engineer your design to meet industry best practice To identify any weaknesses inherent in the design of your security architecture, we will analyse the high-level system documentation focusing on the purpose of the system. To provide a customized risk assessment, we compare the security architecture design against both [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5531","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5531"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5531\/revisions"}],"predecessor-version":[{"id":5536,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5531\/revisions\/5536"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}