Service in which a study is made of the level of security and hardening for different equipment with different operating systems determined by the client, in addition, file identity monitoring is performed.
It focuses on the establishment of policies to detect changes from a known baseline or a state of trust through the use of best practices. It focuses on the creation of a specific closed loop environment for the "expected" changes. Any change identified that not planned or assigned to an authorized work order is suspected of investigation and / or remediation. It takes these two approaches together to provide compliance with one of the 5 critical controls of the CIS Benchmark
- Improved server computer security, based on the measures recommended by CIS Benchmarks - 24/7 monitoring of hardening