Skip to content
Salus Cyber

line of defence

Active Directory

Strengthen your gatekeeper

Maintain control in even the most dynamic environments

Active Directory configurations are often a weak spot in the network defence of an organisation. Identity Access Management is the backbone to most modern-day IT infrastructures and as such, are often targeted by threat actors.

To assess how resilient yours is to unauthorised access, we put ourselves in the shoes of a real-world attacker – particularly targeting passwords, credentials and your corporate configurations. This can form part of a wider Red Team assessment, or play a part in your regular testing to secure your network as it evolves.

Ensure your Active Directory Domain is a stronghold in your defence.

Active Directory and IAM

Security Reviews

Our Security Reviews secure your organisations’ core network by hunting down the risks and revealing the potential impact they could have.

Best Practice

Is your IAM in line with industry best-practice? Does it use all functionality available to best secure and enable the organisation without impacting security?

Malicious Insider

In 2019, 34% of data breaches involved internal actors (Verizon). Identify short comings in the privileges and hierarchies of your company and subvert them.

More Second line of defence services

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back