Secure Configuration Process

Does your organisation operate a secure configuration process to reduce any unnecessary vulnerabilities in your IT systems including servers, endpoints, network devices and systems hosted in a cloud environment?

Yes, we use Infrastructure-as-Code to minimise (and wherever possible eliminate) human engagement in the provisioning processes

Deployment and configuration of laptops (we use Macs) is managed by JamfPRO to ensure they stay in line with our requirements.