<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2114085292224199&amp;ev=PageView&amp;noscript=1">

Design & Configuration Review

Identify weakness in architecture

Build, improve and re-engineer your design to meet industry best practice

To identify any weaknesses inherent in the design of your security architecture, we will analyse the high-level system documentation focussing on the purpose of the system. To provide a customised risk assessment, we compare the security architecture design against both industry best practices and current attack vectors.

Once this has been completed, we may recommend building, improving, or reengineering your design to meet the following: organisational policies, industry best security practices and compliance standards (ie CIS, HIPAA, FERPA, GLBA etc.), legislation and regulations.

An early design or configuration review in the system lifecycle process will enable your organisation to minimise costs and prevent delays. A flawed design or implementation can increase the security risks and can have legal repercussions.

Book a design & configuration review now



Unlike a software requirements specification, a security architecture review will clarify whether the design or configuration will prevent desired functionality, will cause unintended functions or will affect security controls.

Our design and configuration reviews provide security best practice recommendations for:

  • Authentication
  • Cryptography
  • Information the system will hold (PII / PCI DSS) and how it is held
  • User roles and permissions
  • Interactions with external systems
  • Software and framework choices.

 Book a design & configuration review now

Browse our other Security Assurance services:

Contact us today


Call us

1300 659 964



Level 1 Suite 1.06, 1 Epping Road, NSW 2113 


Level 1 Suite 123, 838 Collins Street, VIC 3008


Level 11, 10 Market Street, QLD 4000

Subscribe to our newsletter