Precursor Security
Server Hardening Assessment

Server Build Review

A server build review maps your Windows Server and Linux configurations against industry standard security benchmark controls, the same standards your auditor or penetration tester will reference. We identify the specific settings that need to change and give your team a line-by-line remediation plan to close them.

Industry Standard Benchmarks
Windows Server 2012+
RHEL, Ubuntu, Debian & More
CREST-Accredited Report
Scroll
Scripts vs Expert Review

Beyond Automated Scripts

Automated Hardening Scripts

Script-Based Hardening

  • Implement a subset of security controls only
  • Cannot detect config drift post-deployment
  • Miss application-specific overrides
  • No privilege escalation path testing
  • Not accepted as independent audit evidence
Expert Build Review

CREST-Accredited Assessment

  • 500+ security controls per OS version
  • Manual privilege escalation path testing
  • Config drift and Ansible override detection
  • Credential caching and LSASS analysis
  • Compliance-mapped report for auditors
Risk Intelligence

The Server Hardening Gap

Critical
72%

PRIVILEGE ESCALATION RATE

Of servers we review have at least one privilege escalation path from standard user to root or SYSTEM. These are the paths that turn initial access into full compromise.

Scope
500+

SECURITY BENCHMARK CONTROLS

We test against 500+ industry standard security benchmark controls per OS version, covering Windows Server 2012+ and all major Linux distributions. Scripts typically implement a subset.

Delivery
Live

PORTAL DELIVERY

Findings are published to our real-time penetration testing portal as they are identified. Also available in PDF and DOCX formats.

Mapped
Controls
ISO 27001A.12.6, A.14.2
PCI DSSRequirement 2.2
Cyber Essentials+Secure Config
NHS DSPTStandard 9
When to Commission

When to Commission a Server Review

Most server build reviews are triggered by a pen test finding, an audit deadline, or a gold image standardisation project. If any of these scenarios describe your situation, an independent review provides the evidence you need.

Post-Pen Test Finding

Your external penetration test flagged insufficient server hardening as a high-severity finding. You need a control-by-control remediation plan mapped to industry standard benchmarks, not another finding list.

ISO 27001 Audit Deadline

Your surveillance audit requires independent evidence of configuration assessment against Annex A.12.6 and A.14.2. The auditor will not accept self-assessment or automated script output as independent evidence.

PCI DSS Requirement 2.2

Your QSA requires configuration standards evidence for system components in the cardholder data environment. Industry standard benchmark pass/fail mapping satisfies PCI DSS Requirement 2.2 and the assessment is approaching.

Config Drift After Deployment

Your Ansible playbooks were applied 18 months ago. Security benchmarks have been updated. Redis and Kafka were added with default configs. A client has asked for hardening evidence and you cannot honestly certify current state.

Gold Image Standardisation

You are building a new deployment pipeline and need a hardened base AMI, OVA, or VHDX template as the deployment baseline. You want security built in before deployment, not audited after.

Board Accountability

The Cyber Security and Resilience Bill introduces fines up to £17M or 4% of turnover for inadequate security controls. The board needs demonstrable evidence that server infrastructure has been independently assessed against recognised benchmarks.

Common Findings

What We Typically Find

Across every server estate we review, the same misconfigurations appear. These are not theoretical risks. They are findings our consultants document in reports issued to UK organisations every month.

Critical
Privilege Escalation

Root login enabled via SSH on production Linux server

PermitRootLogin is set to yes in /etc/ssh/sshd_config. Attackers with valid credentials gain immediate root privileges without requiring sudo escalation. Industry standard security benchmarks for Ubuntu 22.04 explicitly require this setting to be disabled.

CVSS 8.6NIST AC-6
Business ImpactDirect root access over SSH without privilege escalation
Critical
Credential Caching

Plaintext database credentials in application config file

A configuration management tool left plaintext database credentials in /opt/app/config.yml with world-readable permissions. The credentials grant full database access and were deployed via Ansible but never rotated or restricted post-deployment.

CVSS 9.1NIST AC-7
Business ImpactFull database access via world-readable credentials on disk
Critical
Legacy Protocol

SMBv1 enabled on production Domain Controller

Server Message Block v1 is enabled on the Domain Controller, exposing it to EternalBlue (MS17-010) and related exploits. SMBv1 is a known attack vector used by WannaCry and NotPetya ransomware. Industry standard security benchmarks for Windows Server 2022 require SMBv1 to be disabled.

CVSS 9.8NIST CM-7
Business ImpactUnauthenticated remote code execution via EternalBlue
High
Privilege Escalation

Unquoted service path allows local privilege escalation

A third-party service executable path contains spaces but is not quoted in the Windows Service Control Manager. A local user can plant a malicious binary in the unquoted path and escalate to the service account (often LocalSystem) when the service restarts.

CVSS 7.5NIST SI-7
Business ImpactLocal user to SYSTEM privilege escalation via service path hijacking
High
Attack Surface

Unnecessary services listening on all interfaces

Print Spooler, WinRM, and Telnet services are running and listening on all network interfaces despite having no business requirement. Each unnecessary service increases the attack surface available to an attacker who has gained initial access to the network.

CVSS 5.3NIST CM-7
Business ImpactExpanded attack surface for lateral movement and exploitation
High
Audit Logging

Security event log maximum size set to 20MB

The Security event log is configured to 20MB with overwrite-when-full policy. In an active environment, this results in log retention of only a few hours. An attacker can operate undetected because their actions are overwritten before incident response begins.

CVSS 6.0NIST AU-9
Business ImpactAttacker actions lost within hours due to insufficient log retention

Most server builds we review have at least one Critical and three or more High findings on first independent assessment.

Server Hardening Methodology

What We Assess

We validate your server builds against 500+ industry standard security benchmark controls and NIST SP 800-123, covering Windows Server 2012+, all major Linux distributions, and cloud instances on AWS, Azure, and GCP. Every finding is mapped to a specific control with line-by-line remediation guidance.

Gold Image

Gold Image Hardening

We audit your master templates (AMI, OVA, VHDX) to ensure they form a hardened deployment baseline. A secure-by-design image your team can confidently roll out across the environment, rather than hardening each server individually after deployment.

Services

Service Minimisation

We identify and disable unnecessary services (Print Spooler, Xbox Live, Telnet, LLMNR, WPAD) that increase the attack surface without adding business value. Each disabled service is mapped to the relevant industry standard control.

Escalation

Privilege Escalation

We hunt for weak file permissions, SUID/SGID binaries, unquoted service paths, and weak sudo rules that let attackers elevate from User to Root or System. These are the paths that turn a compromised web shell into full server control.

Credentials

Credential Caching

We hunt for cleartext passwords in config files, registry keys, and LSASS memory, including credentials left by configuration management tools that were never removed post-deployment. Credential exposure is the most common finding in server build reviews.

Lateral

Lateral Movement

We verify if a compromised server can poison local subnets or expose management interfaces (RDP, SSH, WinRM) to the internet without multi-factor authentication enforcement.

Patching

Patch Management

We audit your patching cadence, identifying known kernel privilege escalation vulnerabilities (DirtyCow, EternalBlue) that remain unpatched in production across Windows and Linux estates.

Platform Coverage

Operating Systems We Assess

We assess all major server operating systems, cloud instances, and hypervisors. Our consultants have deep hands-on experience with each platform, not generic methodology applied across unknown environments.

Windows Server

Windows Server 2016Windows Server 2019Windows Server 2022Windows Server 2025

Linux

RHEL 7/8/9Ubuntu 18.04-22.04DebianCentOSAmazon LinuxAlpine Linux

Cloud Instances

AWS EC2Azure VMsGCP Compute Engine

Hypervisors

VMware ESXiMicrosoft Hyper-V
Engagement Pipeline

Server Audit Workflow

From access provisioning to a compliance-ready hardening report. Automated baselining plus manual verification for complete coverage.

Step 01

Access Provisioning

We connect via SSH or RDP, or review a provided offline VM image. Local admin or root access is required to audit deeper configuration layers beyond surface-level checks.

Step 02

Automated Baselining

We run industry-standard tooling to benchmark your build against 500+ security controls and NIST SP 800-123 security settings across Windows Server and Linux.

Step 03

Manual Verification

Automated tools validate intended configuration. We inspect cron jobs, custom scripts, and application-specific overrides for hardcoded credentials, config drift from the Ansible or IaC baseline, and exceptions introduced by application teams post-deployment.

Step 04

Hardening Report

You receive a risk-rated hardening report with pass/fail results against each security control, specific remediation steps with exact file paths and commands, and an executive summary suitable for ISO 27001, PCI DSS, or Cyber Essentials Plus auditor submission.

Deliverables

What You Receive

Every server build review includes the following deliverables, formatted for technical remediation teams, compliance stakeholders, and auditor submission.

Risk-rated findings register: Critical, High, Medium, and Low
Line-by-line remediation guidance with specific file paths, registry keys, and commands
Gold image hardening report (if base template reviewed)
Privilege escalation path analysis with proof-of-concept reproduction steps
Executive summary suitable for board, CISO, and auditor presentation
Compliance mapping to ISO 27001 A.12.6, PCI DSS 2.2, Cyber Essentials Plus, and NHS DSPT
Retesting within the assessment window to confirm remediated findings at no additional cost

Reports are delivered via our real-time penetration testing portal with role-based access. Also available in PDF and DOCX formats.

After Hardening

Close the Hardening Loop.

A server build review identifies misconfigurations at a point in time. Pair hardening findings with an internal network penetration test to validate whether those configurations can be exploited in practice, and continuous SOC monitoring to detect when new config drift introduces fresh exposure.

Discuss Your Requirements
Service Catalogue

Full Penetration Testing Catalogue

Comprehensive penetration testing services tailored to your environment.

Ready to Secure

The best time to test your defences is now.

Join the high-growth companies relying on Precursor for continuous offensive and defensive security.

CREST Triple Accredited|Fixed Price Quotes|Free Scoping Call|UK Based Team

Frequently Asked Questions

Common questions about this service, methodologies, and deliverables.

Server build review pricing typically ranges from £2,500 to £8,000+ depending on server count and operating system complexity. Single server or gold image reviews (Windows Server or Linux) average £2,500-£3,500 including security benchmark assessment and remediation guidance. Multiple server reviews (3-5 servers, mixed OS) typically cost £4,000-£6,000. Enterprise reviews (5+ servers, Domain Controllers, complex environments) typically cost £6,000-£8,000+. Pricing includes cloud instance reviews (EC2, Azure VMs) at the same rates. We provide fixed quotes after understanding your server inventory and review scope. See our penetration testing cost guide for additional context on assessment pricing.

Automated hardening scripts provide baseline security but do not guarantee security: (1) Scripts may not be applied consistently across all servers or may be overridden by applications, (2) Industry standard security benchmarks cover hundreds of controls across multiple profile levels and scripts typically implement only a subset, (3) Application-specific configurations (web servers, databases) require custom hardening beyond generic OS scripts, (4) Privileged access paths through SUID binaries, scheduled tasks, and service accounts need manual analysis, (5) Gold image drift occurs as servers are patched, configured, and modified post-deployment, and (6) Compliance auditors require independent verification, not self-assessment. A server build review validates that hardening is actually effective, not just applied.

Yes, we review Domain Controllers, Member Servers, Standalone Servers, and Hypervisors (ESXi and Hyper-V). For Windows Server environments, we cover Windows Server 2016, 2019, and 2022 and assess against industry standard security benchmarks (Level 1 and Level 2 profiles). We verify GPO application, check for NTLM relay exposure, review LAPS deployment, audit Credential Guard and Device Guard status, and identify SMBv1, LLMNR, and WPAD misconfigurations. Where Microsoft Security Baseline GPOs are already applied, we identify the delta against the full benchmark control set: they are not equivalent. This assessment pairs well with an Active Directory security assessment for comprehensive AD coverage.

Yes. We review RHEL 7/8/9, Ubuntu 18.04/20.04/22.04, Debian, CentOS, Amazon Linux, and Alpine Linux. We cover SSH configuration (sshd_config hardening, root login, cipher restriction), sudo privilege review, SUID/SGID binary audit, kernel parameter hardening (sysctl), auditd log configuration, and SELinux or AppArmor enforcement. For cloud instances (EC2, Azure VMs, GCP Compute Engine), we additionally check metadata service security, including IMDSv2 enforcement on AWS instances. We also identify config drift where Ansible hardening playbooks have been overridden by application-specific changes post-deployment. See our cloud security configuration review for cloud-native coverage.

Yes. A server build review applies regardless of where the server is hosted. For cloud instances, we also check cloud-specific metadata service security (IMDSv2 enforcement), instance profile permission boundaries, and exposed management interfaces. Cloud instance reviews are priced at the same rates as on-premises servers and can be combined with a cloud security configuration review for full cloud coverage.

You receive a structured hardening report containing: a pass/fail assessment against each applicable industry standard benchmark control for your OS version, risk-rated Critical / High / Medium / Low; line-by-line remediation guidance with specific configuration changes (file paths, registry keys, or command-line steps); an executive summary suitable for board-level reporting or auditor submission; and a re-test consultation to verify critical findings have been resolved. The report satisfies ISO 27001 (A.12.6, A.14.2), PCI DSS Requirement 2.2, Cyber Essentials Plus, and NHS DSPT requirements.

Server hardening is the process of securing an operating system by reducing its attack surface: disabling unnecessary services, applying secure configuration settings, restricting user privileges, and enforcing encryption standards. The goal is to ensure that if an attacker gains initial access to a network, they cannot use a poorly configured server as a pivot point to escalate privileges or move laterally. Professional server hardening assessments validate these controls against recognised industry frameworks such as NIST SP 800-123, producing independent evidence that hardening has been applied correctly.

A professional server hardening checklist covers: (1) Service minimisation: disabling SMBv1, LLMNR, WPAD, and unused listening services; (2) User account policy: password complexity, account lockout, built-in administrator account renaming; (3) Privilege escalation paths: SUID/SGID binaries, unquoted service paths, weak sudo rules, scheduled task permissions; (4) Credential exposure: cleartext passwords in config files, LSASS protection, registry credential storage; (5) Network exposure: management interfaces accessible over the internet (RDP, SSH, WinRM); (6) Patch management: missing OS patches including known privilege escalation vulnerabilities; (7) Audit logging: event log size, log forwarding configuration, login auditing. Our server build review maps every finding to a specific industry standard control with line-by-line remediation guidance.

Hardening a Windows Server involves applying a security baseline aligned to industry standard benchmarks (Level 1 or Level 2 profile for your OS version: 2016, 2019, or 2022). Key areas include: Group Policy hardening (password policy, account lockout, audit policy), disabling legacy protocols (SMBv1, NTLM authentication, LLMNR), enabling Credential Guard and LAPS, restricting PowerShell execution and enabling PowerShell logging, disabling unnecessary services (Print Spooler, Xbox services, Telnet), and hardening Remote Desktop Protocol (NLA enforcement, restricted admin mode). A professional Windows Server hardening assessment verifies these controls are applied consistently across your server estate and identifies where application teams have created exceptions.

Hardening a Linux server involves reviewing and securing the SSH configuration (disabling root login, enforcing key authentication, restricting ciphers in sshd_config), auditing sudo rules and SUID/SGID binaries, applying kernel hardening parameters via sysctl.conf, configuring auditd for system call logging, enforcing SELinux or AppArmor in enforcing mode, reviewing cron jobs and scheduled tasks for credential exposure, and disabling unnecessary network services. Key standards include industry security benchmarks for your distribution (RHEL, Ubuntu, Debian, Amazon Linux) and NIST SP 800-123. A server build review also checks for config drift, instances where Ansible playbooks or hardening scripts were applied initially but individual servers have since been modified by application teams.

Yes. A CREST-accredited server build review from Precursor Security satisfies the audit evidence requirements for ISO 27001 Annex A (A.12.6, Technical Vulnerability Management; A.14.2, Security in Development and Support Processes). The report includes pass/fail results against industry standard security benchmark controls, risk-rated findings, and an executive summary suitable for auditor submission. The same report satisfies PCI DSS Requirement 2.2 (configuration standards for system components), Cyber Essentials Plus (Secure Configuration technical control), and NHS DSPT Data Security Standard 9. If you have a specific surveillance audit or external certification deadline, we scope and deliver within 2-3 weeks.