Security Reviews

In a security review, we focus on the conceptual aspects of a system, component, configuration or code. The experience of our security analysts allows us to identify critical security aspects and provide expertise for proper implementation. This offers you a security foundation or a second opinion on which you can build further - even before the go-live.

 

 

Concept Review

When developing concepts, all business requirements must be met simultaneously, often at the cost of security. We analyze your concepts, identify potential vulnerabilities and provide recommendations to improve security and implement best practices.

 

Firewall Rules and Zone Concept Review

Firewalls are among the most important and critical network components. In a firewall review, we assess whether your firewall configuration fits your general zone concept, whether they support the segregation of your networks effectively and whether your rules are correctly implemented to protect your systems following the least privilege principle.

 

Source Code Review

A single forgotten character or a single statement in the wrong place can make the difference whether your code is secure or not. While we do not offer full automated source code scanning, our analysts can assess critical components or specific security-relevant functions manually and in-depth. This allows us to challenge the code for logical flaws, which an automated tool cannot perform.

 

Configuration Review

Cloud infrastructure (such as Microsoft Azure, Amazon Web Services and Google Cloud Platform), proxies, web application firewalls, spam filters and any other security component can be configured in various ways. The services are very complex to configure and thus, they may end up with default or insecure settings. In order to gain the assurance that services are secure and equipped with the industries' best practices, we review your configurations and provide suggestions for improvement.

 

Hardening Check

Every single client and server in your network can be a target for hackers. We verify your Windows or Linux builds for vulnerabilities and best practices so that you get a solid and secure base image.

Hardening checks usually cover:

  • BIOS and disk encryption, physical security
  • Security policy and settings (GPOs)
  • Users, groups and permissions
  • Network and firewall settings
  • Active Directory specifics, single sign-on
  • Software & Services (Macro, AV, EPP, EDR, VPN, etc.)
  • Software restrictions (AppLocker, SELinux)
  • Data exfiltration measures (DLP)
  • CIS controls benchmarking

 

We are glad to give you further information: Your contact person​​​​​​​​​​​​​​

CALENDAR

Beer-Talk in Bern: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

Compass Security an der ETH Kontaktparty

Wir nehmen teil an der schweizweit grössten akademischen IT-Recruitingmesse. Komme am Samstag, 29. Februar 2020 an die ETH Zürich und besuche uns am... Read more

Beer-Talk #21 in Berlin: Lessons learned from Shitrix

Gefahr für tausende Firmen, öffentliche Einrichtungen und Behörden. Wir berichten von unseren gewonnenen Erkenntnissen aus der kritischen... Read more

ALL DATES

NEWS

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

Daten als Wettbewerbsvorteil

Das Basel Economic Forum ist das Wirtschaftsforum für die trinationale Metropolitanregion Basel und die Nordwestschweiz. Im November fand die 6.... Read more

Vulnerability in Apache Olingo OData 4.0

Compass analysts identified an XXE vulnerability in Apache Olingo OData 4.0. Read more

ARCHIVES

Compass Security Blog

OWASP – Toronto January 2020

A write-up of the OWASP Toronto January talk which mainly focused on the correlation and integration of results generated by automated tools in application security such as SAST, DAST and SCA.... mehr

Interview with Jim McKay

“I love hacking can be used for the greater good.” During the Solothurn Film Festival 2020 we had the opportunity to meet Jim McKay, who directed, among others, two episodes for Mr. Robot season one.... mehr

ZUM BLOG