Audits sécurité
Config MDM, posture des endpoints, périmètre identité, état des patchs et exposition des données — résultats classés par impact et effort, pas par gravité théorique.
I look at device fleets the way an attacker would — asking what can be reached, what’s not configured, and what a compromised endpoint would expose.
What a review covers
- MDM configuration audit: what profiles are deployed, what gaps exist
- Endpoint posture: encryption, firewall, SIP, Gatekeeper, secure boot
- Identity and access: SSO scope, privileged access, offboarding processes
- Data exposure: what’s on-disk, what syncs to cloud, what leaves the network
- Patch posture: OS versions, app versions, known CVEs in your tooling
Output
A written report with findings ranked by impact and effort, specific remediation steps, and a follow-up call to work through questions.
What this isn’t
A penetration test. I don’t exploit live systems or simulate attacks. This is a configuration and posture review — written, specific, and actionable.
✍️ Contact
Prêt à cadrer le projet ? Contactez-moi directement.
Email : adam@mpc.ad
Téléphone : +376 647 764
WhatsApp : +376 647 764