Most security incidents originate inside the network. Data leaks can have significant financial and reputational impacts. We make sure your IT infrastructure is stable, secure, and ready for future challenges.
Common Challenges Our Clients Have Faced – And We’ve Helped Solve:
Insufficient security measures / database configuration
Non-compliance with regulatory requirements or standards
Lack of systematic auditing and risk analysis
Optimal database configuration, data recovery, and backup
How we help
DiSec and DiMon Tools
We useDiSec, an analytical tool, for IT system audits and application control audits. The tool’s output then serves as a basis for internal audits, regulatory checks (e.g., NIS2, GDPR) and the regular evaluation of database security levels. The outputs can also be useful when communicating with the Czech National Bank and NUKIB (National Cyber and Information Security Agency).
Another tool, DiMon, is used for continuous, long-term monitoring of these settings, keeping an eye on database performance, availability, and operational parameters. Regular reporting allows for early problem detection and operational optimization.
How we work
We work in four stages, ensuring an effective and secure assessment of the database environment. Based on the results, we identify vulnerabilities and propose specific steps for improvement and regulatory compliance.
- Phase A – Preparation of scripts for database settings analysis
- Phase B – Client runs the scripts, providing input data for our analysis
- Phase C – Result analysis in KPMG's secure environment
- Phase D – Final report with recommendations
The final report can be followed by a more extensive audit/review of the IT environment focusing on testing key IT areas (access rights, change management, incident management, physical and cyber security, data management within IT governance, etc.).
We cover the following technologies:
Oracle Database (versions 11g – 19c)
More than 200 security checks according to CIS
Linux (Red Hat, Oracle Linux)
Over 650 checks being prepared for versions 7 to 9
Microsoft SQL Server (versions 2008–2022)
Near 50 checks according to CIS
Windows Server
Part of CIS benchmarks, OS security settings coverage
Standards and methodologies
CIS benchmark
Recommendations for security configuration of technologies (OS, databases, servers)
ISO 27001, COBIT, ITIL
Frameworks for management of information security and IT processes
NIS2, DORA, GDPR
Legislative requirements in the field of cybersecurity and data protection
References
Comprehensive audit of security settings according to CIS standards
The client was aware of the risks associated with insufficient security of their Oracle databases and wanted to compare their settings against existing benchmarks and standards. Using the DiSec analytical tool, we performed a comprehensive audit of security settings in accordance with CIS standards. A detailed analysis identified the biggest weaknesses, helping us propose specific measures to increase security. After implementing the recommended solutions, the client’s data protection improved significantly, reducing the risk of potential attacks.
Security configuration of Oracle and MS SQL databases
The client wanted to regularly evaluate the security level of their Oracle and MS SQL databases for internal purposes and to use as a basis for regulatory checks (NIS2, etc.). In response to recurring security incidents threatening sensitive data, we audited IT processes, configured databases, and introduced effective detection and response mechanisms. The DiSec tool now provides the client with regular and timely alerts about unusual activities and settings in Oracle and MS SQL databases.
Contacts