Skip to main content

Network Segmentation & Segregation Review

Updated over 5 months ago

Service Overview

The Network Segmentation and Segregation Review evaluates an organization’s network architecture to identify design weaknesses, misconfigurations, and policy gaps.


Methodology

The review includes mapping the current network layout, VLANs, Layer 3 appliances, key business applications, administrative access, and user activity. Firewall policies and configurations are then reviewed to detect permissive or insecure rules that could expose critical assets.

The activity focuses on:

  • Identifying overly permissive rules

  • Detecting unsecured traffic routes to organizational assets

  • Reviewing administrative privileges and access levels

  • Evaluating firewall administrative communications for security gaps

Note: While the assessment is comprehensive, it is sample-based and centered on the scenarios outlined above.


Deliverables

A detailed report including:

  • Identified design flaws

  • Risky or permissive policy rules

  • Recommended mitigation steps related to network design and policy corrections


Prerequisites

The following access and information must be provided:

  • Read-only access to relevant firewall management interfaces

  • Complete list of VLANs with detailed functions

  • Asset inventory and corresponding IP addresses

  • Network diagrams or schematics

  • Configuration files, depending on the firewall vendor


Customer Engagement

A meeting with infrastructure or IT teams is required to review the different network zones and access schemes used by standard employees.


Relevant Standards

The methodology follows the National Institute of Standards and Technology (NIST) guidelines and incorporates insights gained from prior organizational assessments relevant to the client.


Security Domains Covered

  • Policies and procedures

  • Network level security

  • Servers, network equipment, and endpoints security

Did this answer your question?