![](https://sourcing-media.hktdc.com/product/7d74b41be39d11ea883f06c82c63b760/83514d0fe39d11ea883f06c82c63b760)
Our secure configuration review service mainly involves technical IT auditing. It is a manual checklist-based process conducted in the presence of the asset owner. A detailed report highlighting the findings and the associated risk factors will be delivered.
- Includes OS, service, and protocol level checks.
- Specific areas include databases, user desktops, and applications like CRM and ERP.