Security Baseline Check
Continuous Hardening

Continuous detection of security-critical configuration drift

Security Baseline Check

Hardening only works if it is actually enforced and remains stable under operational change. The Security Baseline Check evaluates the real security configuration of your systems against recognised hardening standards, identifies drift, and prioritises actions by risk.

Why hardening alone is not enough

A documented security baseline is not the same as an enforced one. In any production environment, drift accumulates: through operational decisions, exceptions, new systems, platform updates and unintended configuration changes.

A one-off conformance measurement creates short-term clarity – but no durable security standard. The difference between a hardening slide and an effective security configuration is continuous oversight: detect drift, evaluate it, prioritise it.

What we assess

The assessment covers the security-critical configuration areas:

  • Security configuration against recognised hardening standards
  • Logging and audit configuration
  • Authentication and password policies
  • Privileged accounts and access
  • Unsafe services and protocols (e.g. deprecated TLS versions, weak SMB / LDAP configurations)
  • Patch and baseline status
  • Critical security settings in the operating system and platform services
  • Consistency between target state and operational reality
  • Risk-based evaluation of deviations

Methodology and tooling

Agent-based security assessment — we use platform-supported collection of your security configuration that captures results consistently over time.

Mapping against recognised hardening standards — evaluation is performed against established security baselines, always in the context of your operational reality.

Operational, not formal — we evaluate effectiveness, not ticks. A configuration deviation is prioritised by real risk and effort, not by checklist count.

Continuous Hardening (Standard and Continuous Hardening tier) — recurring assessments make drift visible before it becomes operationally entrenched.

What you receive after the check

The report is written so that IT operations and security ownership can act immediately. The Continuous Hardening tier establishes a recurring assessment rhythm rather than a single-point snapshot.

  • Technical security evaluation per system and in summary
  • Risk-based prioritised action list
  • Concrete configuration recommendations
  • Drift view over time (Standard, Continuous Hardening)
  • Recurring reviews with trend observation (Continuous Hardening)

Phases

1½–1 day

Scoping

System scope, collection mode, tier selection

21–2 days

Data collection

Platform-supported collection of security configuration

32–5 days

Analysis

Evaluation against hardening standards, drift analysis, prioritisation

41 day

Report & walkthrough

Delivery + workshop; Continuous Hardening continues into a recurring assessment rhythm

Report typically within 10 business days after data collection is complete.

Pricing

Tier selected by estate size and assessment depth.

Compact

Up to 10 systems. Initial technical security assessment, baseline analysis, action overview, results workshop.

from €3,900

Standard

Up to 50 systems. Extended baseline analysis, risk-based prioritisation, customer-specific adjustments, technical detail.

from €8,900

Continuous Hardening

Larger estates. Continuous security evaluation, drift detection, recurring reviews, continuous improvement.

from €14,900

Indicative figures; final fixed price after scoping call.

Frequently asked questions

What does drift detection mean in practice?

Drift detection identifies the deviation between your defined target security configuration and the actual configuration over time. Without drift detection, any one-off hardening remains static – with it, the points where your protection silently shifts become visible.

Which platforms do you cover?

We cover the common server and endpoint platforms (Windows Server, Windows endpoints, the established Linux distributions) and selected network and platform services. The exact scope is defined in the scoping call.

Will you change our configuration?

No. The assessment is non-invasive and operates on read-only level. We deliver configuration recommendations; implementation is performed by your operations team or optionally in a follow-on engagement.

How is this different from a pure compliance scan?

A compliance scan delivers a point-in-time conformance measurement against a standard. The Security Baseline Check evaluates operational security capability over time, prioritises by risk, and creates the basis for Continuous Hardening — no "100% compliance" promise, but effective configuration in production.

What does Continuous Hardening mean operationally?

Continuous Hardening is a recurring assessment rhythm: we capture drift, evaluate it and deliver an updated action state at defined intervals. Instead of a once-per-year snapshot, your security configuration remains stable over time.

What happens after the check?

You have a clear action path. Common follow-ups: targeted hardening engagements, a recurring Continuous Hardening rhythm, or integration into an existing vulnerability or configuration management programme.

Kontakt aufnehmen

How stable is your hardening line in production?

A scoping call is enough to align on system scope and tier. No commitment up front.