Skip to content
Salus Cyber

Security Configuration Review

Database Security Review

Secure your data is secure with our data review service.

Ensure your databases comply with industry-accepted good practices.

Salus provides a thorough database review service to help your business understand its database security posture. Our team of certified professionals, which includes CREST and Cyber Scheme certified consultants, have the latest knowledge to conduct comprehensive reviews of your databases. Our focus is not just to provide a tick-the-box service when it comes to reviewing the configuration of your databases but to provide the context of the risks for your business and unique goals.


  • Compliance: During the configuration review process, our consultants will perform a review of your databases, complying with standards such as CIS Benchmarks, which are guidelines of industry-accepted good practices.


  • Updates and Patching: The database software version used and the patching frequency will be assessed to deduce the susceptibility to publicly known vulnerabilities.


  • Authentication and Authorisation: The access controls established in your database instance will be evaluated to identify whether access is adequately restricted.


  • Password Policies: The quality of the passwords used for your database will be evaluated. This process will include checks such as whether passwords are set to expire after an adequate period.


  • Encryption: This phase will cover the quality of encryption used to protect data stored in the database. Issues that could be raised during this phase include using deprecated encryption standards.
First Line Dark


A database review will help your business identify any gaps in your security posture, allowing you to take the appropriate steps to remediate them and improve your security posture. Additionally, the review will help ensure your databases are following regulation needs.


By identifying issues within the configuration of your databases and remediating them will help reduce the likelihood of your business suffering from a data breach, helping prevent any reputational damage that may occur that may incur as a result.


A challenge of database reviews is the complexity involved with numerous different types and versions. Our company aims to resolve this challenge by ensuring we have a team of consultants with deep knowledge of all types of databases.


Balancing security with usability is a key challenge when providing feedback. While it is crucial to secure your databases, our company understands that implementing overly strict security measures may have a negative impact on your productivity. To resolve this challenge, our team considers your business needs during reporting to ensure that your databases are configured as securely as possible without impacting your productivity severely.

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back