• Network Asset Inventory - Identify all connected devices, systems, and endpoints.
  • Topology & Architecture Review - Analyze network design, segmentation, and data flow.
  • Firewall & Router Configuration Review - Check for misconfigurations, outdated rules, and weak access controls.
  • Access Control Assessment - Evaluate user authentication, role-based access, and privilege management.
  • Patch & Vulnerability Management Audit - Review the process and governance towards patch and Vulnerability Management.
  • Policy & Procedure Review - Ensure alignment with ISO 27001, NIST, or client-specific frameworks.
  • Incident response readiness reviews.
 
     
3105 Times Visited