IT Service Provider
Security Audit of an On-Premise Active Directory with a Concept for an AD Tiering Model
For reasons of discretion, we do not list the names of our clients. However, we will be pleased to provide references and letters of recommendation following consultation with the organizations concerned.
Security Audit of an On-Premise Active Directory with a Concept for an AD Tiering Model
Audit of the physical security of new office premises in the context of information security. The audit was based on ISO/IEC 27001:2013, ISO/IEC 27002:2022, the ICT minimum standard of the Federal Office for National Economic Supply (FONES) and the BSI IT-Grundschutz. The audit catalogue was based on the relevant BSI IT-Grundschutz blocks.
Conducting an audit according to the ICT minimum standard of the Federal Office for National Economic Supply (FONES) at a Swiss critical infrastructure. The audit included a detailed study of documents, interviews with all stakeholders and the writing of an audit report.
Technical and conceptual audit with internal security scan, Windows client audit as well as a process and design review
Technical security audit of the IT infrastructure, including a security scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, a review of the mail infrastructure and a phishing campaign were performed.
ISO 27002 audit with the involvement of IT partners, including the development of a security roadmap
Technical security audit of the IT infrastructure, including a vulnerability scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, a review of the firewall configuration and mail infrastructure was performed.
IT audit based on IT General Controls (ITGC) and review of ISAE report
ISMS status review, architecture review of the entire network infrastructure and security configuration review of the cloud, firewall and VPN security configuration
Security scan of internal and external systems and audit of a client system. Analysis of process security and creation of a BCM workshop
Technical security audit of the IT infrastructure, including a vulnerability scan of the internal and external infrastructure as well as an audit of a Windows 10 client. Additionally, reviews of the mail and WLAN infrastructure, the internet proxy and the Active Directory.
Concept review and implementation review of an iOS and an Android application as well as the corresponding backend infrastructure
No results found.
Don’t miss anything! Subscribe to our free newsletter.
Availability Monday to Friday 8:00 a.m. – 12:00 p.m. and 1:00 p.m. – 5:00 p.m (exception: customers with SLA – please call the 24/7 IRFA emergency number).
Private individuals please contact your trusted IT service provider or the local police station.
For more information about our DFIR services here: