Our penetration testing team holds industry-recognized certifications




"It Works" Doesn't Mean "It's Secure"
A firewall can pass traffic perfectly while still allowing "Any-Any" rules that expose your entire network. A cloud server can host your website reliably while leaving the administrative console open to the public internet. Functional configurations often drift away from secure configurations over time, leaving silent gaps that automated scans miss and attackers love.
The Solution: A White-Box Technical Audit
Security Assessments are comprehensive, "White-Box" reviews of your infrastructure’s configuration. Unlike a penetration test (which simulates an outsider trying to break in), an assessment assumes we are the insider. We look "under the hood" at your rule sets, architectural diagrams, and device settings to compare them against industry best practices (CIS Benchmarks, NIST).
How We Help
We provide the rigorous technical validation your IT team needs:
- Firewall Assessments: We review every line of your firewall policy to remove redundant, shadowed, or overly permissive rules.
- Architecture Reviews: We analyze your network topology to ensure proper segmentation between critical servers and guest Wi-Fi.
- Build Reviews: We inspect the "Gold Image" of your laptops and servers to ensure they are hardened before they are ever deployed.
Core Capabilities
Firewall Rulebase Review
We analyze your firewall configurations (Palo Alto, Fortinet, Cisco) line-by-line to identify unused objects, dangerous "Any" rules, and lack of logging.
Cloud Configuration Review
A deep-dive audit of your AWS, Azure, or M365 environment to detect misconfigured S3 buckets, weak IAM permissions, and lack of MFA on root accounts.
Active Directory (AD) Health Check
We assess the security of your Domain Controllers, looking for legacy protocols (NTLMv1), weak password policies, and dormant admin accounts that increase risk.
Wi-Fi Security Assessment
We evaluate your wireless network security, checking for weak encryption (WEP/WPA2-PSK), rogue access points, and insecure guest network isolation.
Host Build Review
We audit the standard operating system image (Windows/Linux/macOS) used on your devices to ensure unnecessary services are disabled and security controls are enforced by default.
Key Benefits
Harden Your Defenses Move from default settings to secure settings. We help you turn off dangerous features you don't need, which shrinks your attack surface significantly.
Optimize Performance A bloated firewall ruleset slows down traffic. Cleaning up years of accumulated temporary rules often improves network performance and makes day-to-day management easier.
Verify Vendor Work If a third-party MSP manages your network, how do you know they're doing a good job? Our assessment gives you an independent, unbiased view of their work.
Audit-Ready Documentation You'll receive detailed technical documentation of your current state. This is critical for passing audits like ISO 27001, PCI-DSS, and SOC 2, where you need to show that change management is actually being followed.
What Does a SecureIT Penetration Test Report Include?
See the quality of our work
before you engage
We share a redacted sample report and our full testing methodology so you know exactly what to expect — the format, depth, and actionability of every deliverable.
- Redacted sample penetration test report with real findings
- Step-by-step methodology document for your service type
- Example severity ratings, CVSS scores, and remediation steps
- Executive summary format used by our clients for board reporting
Frequently Asked Questions
What exactly gets reviewed during a security assessment?
It depends on scope, but a typical network and infrastructure security assessment covers firewall configurations and rulesets, network segmentation and access control lists, VPN and remote access setups, switch and router hardening, patch levels across network devices, and logging and monitoring configurations. We look at what you have, how it's configured, and whether those configurations actually match your security policies.
How is this different from a penetration test?
A penetration test tries to actively exploit vulnerabilities to see how far an attacker can get. A security assessment is more of a configuration and architecture review. We're not trying to break in; we're reviewing how things are set up and identifying where the gaps are. The two complement each other. A security assessment is often a good starting point before a penetration test, so you're not paying to find issues that a configuration review would catch first.
Do you need access to our systems to run the assessment?
Yes. We'll need read access to your firewall configurations, network diagrams, and device settings. We don't need administrative control or the ability to make changes. In most cases, this is done by exporting configurations and sharing them with our team, or through a read-only admin account during a remote session. We can work with whatever method fits your security policies.
Will the assessment cause any downtime or disruption?
No. A configuration-based security assessment is entirely passive. We review what you give us and analyse it offline. There's no scanning of live systems and no risk of disruption to your network. If the scope includes any live testing components, we discuss and agree on timing with you in advance.
What do we get at the end?
You'll receive a written report covering all findings, ranked by severity. Each finding includes a clear description of the issue, the risk it creates, and a specific remediation recommendation. We also provide an executive summary for management and a technical appendix for your IT team. If needed, we can walk your team through the findings in a debrief call.
How long does a security assessment take?
Most security assessments are completed within one to two weeks from the point we receive all the required access and documentation. Larger environments with multiple locations or complex network topologies may take a bit longer. We'll give you a clear timeline during scoping so you know what to expect.
Can this be used as evidence for ISO 27001 or PCI-DSS compliance?
Yes. The documentation we produce is designed to support audit requirements. For ISO 27001, it supports controls around network security management and vulnerability management. For PCI-DSS, it covers requirements related to firewall configuration and network access controls. We can tailor the report format to map findings to specific control requirements if needed.
Explore Our Penetration Testing Services
All engagements are carried out manually by our certified team. No automated scanning, no offshore delivery.
All Penetration Testing Services
SecureIT delivers manual penetration testing across networks, web applications, mobile apps, APIs, and Active Directory. Our team is based in Reykjavík, Iceland and works with clients globally.