SBVA (Standard Build Vulnerability Assessments) Testing
Standard builds refer to a pre-configured set of hardware, software, and network components that are used as a baseline for deploying IT systems and applications in an organization. A standard build is a template that defines the hardware specifications, operating system configurations, software applications, and security settings that should be used for each type of IT system or application in the organization.
The benefits of using standard builds often include:
-
Consistency: Standard builds ensure that all IT systems and applications in an organization have a consistent configuration, which helps to minimize configuration errors and improve the reliability and stability of the systems.
-
Efficiency: Standard builds can be automated, which helps to reduce the time and effort required to deploy new IT systems and applications, and reduces the risk of human error.
-
Security: Standard builds can include security configurations and best practices, which helps to reduce the risk of security vulnerabilities and improve the overall security posture of the organization.
-
Cost savings: Standard builds can help to reduce the costs associated with deploying and maintaining IT systems and applications by reducing the time and effort required to deploy new systems and by reducing the costs of purchasing and deploying new hardware and software.
Standard builds are typically created and maintained by IT organizations and are used as the baseline for deploying new IT systems and applications in the organization. They are typically reviewed and updated regularly to ensure that they are up-to-date with the latest hardware, software, and security configurations.
A standard build security assessment is an evaluation of the security configurations and best practices that are included in a standard build in an IT context. The goal of a standard build security assessment is to identify any security vulnerabilities or weaknesses in the standard build before the build is sent out en masse into a production environment.
Our Standard build security assessments typically include the following:
1) Review of the standard build: A review of the standard build to identify the hardware specifications, operating system configurations, software applications, and security settings that are included in the standard build.
2) Vulnerability scanning: A vulnerability scan of the standard build to identify any known security vulnerabilities in the hardware, software, and operating system components.
3) Threat modeling: An analysis of the potential security threats that could be posed by the standard build, and the likelihood of those threats being exploited by attackers.
4) Penetration testing: A simulated attack on the standard build to identify any security weaknesses that could be exploited by attackers.
5) Best practices review: A review of the security best practices that are included in the standard build, whether it is an OS, Web Server, Database, Container etc to ensure that they are up-to-date and consistent with the latest security guidelines.
6) Reporting: A report that summarizes the findings of the assessment, including any identified security vulnerabilities, their risk, recommended remediation steps, and best practices for securing the standard build.
These assessments can strategically eliminate a multitude of misconfigurations and threats before being deployed into production environments.