Over time, all organizations’ network infrastructure change. Changes often reflect organizational needs, process changes, resource needs as well as other factors. Typically, these changes are looked at from a tactical standpoint. How do we get from point A to point B as seamlessly as possible? In many cases, security is an afterthought. Network and System changes take place and inadvertently open holes or attack vectors without the knowledge of current systems owners. Even when best of breed security technologies have been implemented won’t help if the underlying security architecture is flawed.
During a Security Architecture Review, we’ll conduct a systematic examination of all the layers of your organization’s network. We’ll examine the existing network topology, privilege access management policy, deployment of the security controls within the organization like firewalls, IDS / IPS, network segmentation and make recommendations to increase the effectiveness of the security controls.
Often part of a compliance engagement, we can review the state of your networks’ security in regards to how its been architected. We’ll identify gaps & potential threats in the existing environment. Evaluate if systems are secured, configured, and patched according to international best practices and security standards.
During a network architecture review, the assessor will evaluate the security of Client network architecture and infrastructure. Existing network diagrams and network documentation will be reviewed and interviews with network security analysts, network engineers, and network architects will be conducted in order to confirm documentation and answer outstanding questions. The network architecture review will evaluate the function, placement, and gaps of existing security controls and compare their alignment with the organization’s security goals and objectives. Our highly skilled security experts can assist with planning, building and implementing a more successful security program.
Some activities include:
- Review the latest Threat Risk Analysis report produced from a Vulnerability Assessment or Penetration Test.
- Conduct interviews with Network Administrators focusing on best practices in infrastructure design, and validate the findings from a documentation review and vulnerability scans.
- Analysis of current IT network, information flow according to business requirements and points of access to information.
- Analysis of current security controls and management, policies and procedures related to network design.
- Analysis of existing network security architecture, including topology / configuration, and security components/features, including:
- Key design assumptions
- Technology inventory
- Security administration procedures
- Network topology
- Network access controls
- Authentication and access requirements
- Host access controls
- Administrative and maintenance channels