Security is one the most important aspects of all new network designs. A secure network design allows for greater network segmentation, more detailed access controls, better logging and monitoring, and the removal of single points of failure. A network’s infrastructure and architecture security is the foundation for all of your security, so each network device must be well-secured and properly designed. In fact, many risks can be mitigated by implementing secure-by-design architecture.
Foundstone security consultants perform detailed analysis on current network architecture and identify all vulnerabilities by using a comprehensive three-phase approach to ensure that malicious intruders do not gain access to critical assets.
The overall network architecture review includes assessing the current security technology and processes in your organization, evaluating the critical information assets in your infrastructure, and analyzing the security roles related to the infrastructure. Our process consists of interviews and documentation review. Foundstone can also use the knowledge of your infrastructure gained during other assessments.
During this assessment, Foundstone security consultants assess the security architecture of your company's infrastructure. Foundstone evaluates the current design structure of the various security control mechanisms in place to determine their effectiveness and alignment with your company's security goals. Our process takes a careful look at the strengths and weaknesses in your technical security architecture. Foundstone will examine the following components:
The components listed above are assessed in three primary phases:
The last step in the process assesses how management addresses security monitoring, escalation, and follow-up procedures that provide your organization with preventative and adaptive security capabilities. This program includes: