|
|
- Network Asset Inventory - Identify all connected devices, systems, and endpoints.
- Topology & Architecture Review - Analyze network design, segmentation, and data flow.
- Firewall & Router Configuration Review - Check for misconfigurations, outdated rules, and weak access controls.
- Access Control Assessment - Evaluate user authentication, role-based access, and privilege management.
- Patch & Vulnerability Management Audit - Review the process and governance towards patch and Vulnerability Management.
- Policy & Procedure Review - Ensure alignment with ISO 27001, NIST, or client-specific frameworks.
- Incident response readiness reviews.
|
|
|
|
|