The results of the audit contain valuable insights specific to your implementation, such as:
Best practices and recommendations to resolve your security-related issues
Security recommendations around your environment (IIS, SQL, etc.) and Kentico configuration
Vulnerabilities in your implementation and custom code Delivering At the beginning of the engagement, we agree on how the audit will be delivered.
Once completed, you receive a detailed assessment containing our recommendations regarding the security of your configuration and implementation. We then go over the results with you to make sure we address any questions you might have.