Network Configuration Review
A Network Configuration Review examines, from a technical viewpoint, the effectiveness of an organization’s security infrastructure and security policies relating to hardware, software and users.
A Broken Cipher Network Configuration Review comprises of:
- An examination of network topology
- An audit of the firewall and server configurations
- A review of security policies
- A detailed report of the findings, issues and recommendations
The Network Configuration Review is undertaken by experienced consultants and is structured around the requirements of ISO 27001 for an Information Security Management System (ISMS). This includes:
- Access control
- Logging and monitoring
- Business continuity
The output of a Broken Cipher Network Configuration Review is a report with a non-technical overview of the impacts and likelihood of the most serious security issues, coupled with full details of the audit undertaken, more comprehensive descriptions of the individual issues, and recommendations for resolution.
We prefer to deliver this Network Configuration Review report face to face to enable discussion and full comprehension of the risks identified. We also make our auditors available for further meetings and discussions with those who are tasked with fixing any issues.
A Broken Cipher Network Configuration Review will demonstrate to management if investment in security is required to reduce risk to an acceptable level, and justifies security budget expenditure.
A regular Network Configuration Review will identify any infrastructure of procedural changes that have caused any major security vulnerabilities.
Application Configuration Review