- check the compliance of configurations with recognized standards: ANSSI RGS, CIS, NIST, etc. or those related to an internal policy
- ensure that assets configuration does not create any security risk that could impact the information system
- analyse and control the growing sets of rules on security equipment: firewalls, IDS/IPS…
- apply effective identity and access management to prevent fraudulent access (life cycle of users / service accounts)
- check the efficiency of specific configurations (EDR, IPS, etc.)