During the course of normal network security operations, operation staff move technology and deploy new devices in a manner which sometimes inadvertently violates compliance with computer and Internet security policy.
Configuration changes which are meant to be temporary sometimes are forgotten and become part of the permanent infrastructure. A second pair of eyes to review the configuration of a dynamic network is always beneficial.
The goals of the ERE network security architecture audit are to identify:
- security risks relating to the placement and validity of all major network components.
- where the current architecture may not remain secure
after the deployment of a plan to change the network.
(deploy servers, network devices, communications links,
dual NIC cards).
- discrepancies between the existing network diagram and ERE’s physical observations of the network made during a walk-around investigation.