Network Security Audit Checklist
Network Security Audit Checklist
Network Security Audit Checklist
Design and architecture review Network overview architecture: Conduct reviews for the modularity,
scalability, and capabilities of the network.
Traffic flow: Assess the application's traffic flow, data center, internet
edges, client access, WAN, cloud, and so on.
Services and OLAs: Assessment of high availability, if Operational-
Level Agreements (OLAs)/Service Level of Agreements (SLAs) have
been defined. MPLS/VPN service: Remote office and client access
capabilities.
QoS Standards: Deployment methods used.
Layer 2 optimization: Assess spanning tree security/optimization and
distributed layer 2 attributes.
Layer 3 routing: Review that the routing is dynamic, optimized, and
secure.
Configuration management The focus here is on attributes such as backup, automation, and
change management: