80 Broad Street, 5th Floor
New York, NY 10004
www.2secure.biz
info@2secure.biz
Tel: 646-666-9601
Fax: 718-942-5355
Date: 10/13/2014
Case Study: NETWORK SECURITY AUDIT
Preface: A Network Security Audit evaluates network devices for security settings and recommends changes to en-
hance resilience and compliance.
The Case: A Law Firm headquartered in New-York City with more than 10 worldwide branch locations, was looking
to perform a Network Security Audit on its infrastructure.
This audit followed 3 main phases:
Discovery: Documenting devices with their Location, Model #, serial, MAC and management IP
Network Diagrams: Create global and location based diagrams.
Assessment: Management Access Best Practices
 TACACS+ (highlight omissions)
 SNMPv3 (highlight omissions)
 Privilege levels (highlight omissions)
 Line, console, VTY access
 AAA functionality correct and operational
 Support for SSHv2, no Telnet
 Use of HTTPS and disable HTTP (if applicable)
Assessment: Device Hardening Best Practices
 Secure routing practices
 Disable unused services and ports
 Device plane hardening techniques
 Infrastructure ACLs
 Layer-2 security
 Performance Recommendations
Assessment: Network Policy Review
 Validate current device OS software against known PSIRT advisories
 Adherence with industry and regulatory requirements
The above process was fully documented with a report that both Managers and Engineers understood.
In Conclusion: Our experts delivered greater security, visibility and control over infrastructure while saving money.
About 2Secure Corp
2Secure is a Cyber Security firm that takes a PROACTIVE approach to solving network problems. We provide the
right tools to fix problems the first time around – in fact, we guarantee it!

More Related Content

PDF
VAPT Services by prime
PDF
Trustport - Roman Veleba
PDF
Darryl T. Smith Resume (1)
PDF
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
DOCX
Jeffrey_Smith_Resume_2016
PDF
Penetration Testing Services, Penetration Testing
PPTX
Vapt( vulnerabilty and penetration testing ) services
PPTX
What is Next-Generation Antivirus?
VAPT Services by prime
Trustport - Roman Veleba
Darryl T. Smith Resume (1)
Insights of a brute-forcing botnet / VERONICA VALEROS [CISCO]
Jeffrey_Smith_Resume_2016
Penetration Testing Services, Penetration Testing
Vapt( vulnerabilty and penetration testing ) services
What is Next-Generation Antivirus?

What's hot (20)

PDF
Carbon Black Corporate Overview 2016
PDF
JAKU Botnet Analysis
PDF
RAMNSS_2016_service_porfolio
PPTX
Nac market
PDF
Penetration testing & Ethical Hacking
PDF
Larry fermi generic nac overview-expanded - atlseccon2011
PPTX
Base Metal Forensics
PPT
What Every Organization Should Log And Monitor
PDF
Penetration Testing Services
PPTX
Ethical hacking/ Penetration Testing
PDF
What Is Next-Generation Endpoint Security and Why Do You Need It?
PPT
Firewall audit
PPTX
Vulnerability and Assessment Penetration Testing
PPTX
Intro to Network Vapt
PPTX
Ethical Hacker
PPTX
OTG - Practical Hands on VAPT
PDF
Security and Privacy in Visual Sensor Network
PPTX
VAPT, Ethical Hacking and Laws in India by prashant mali
PDF
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Carbon Black Corporate Overview 2016
JAKU Botnet Analysis
RAMNSS_2016_service_porfolio
Nac market
Penetration testing & Ethical Hacking
Larry fermi generic nac overview-expanded - atlseccon2011
Base Metal Forensics
What Every Organization Should Log And Monitor
Penetration Testing Services
Ethical hacking/ Penetration Testing
What Is Next-Generation Endpoint Security and Why Do You Need It?
Firewall audit
Vulnerability and Assessment Penetration Testing
Intro to Network Vapt
Ethical Hacker
OTG - Practical Hands on VAPT
Security and Privacy in Visual Sensor Network
VAPT, Ethical Hacking and Laws in India by prashant mali
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Ad

Viewers also liked (12)

PDF
Network Audit
PDF
Technology Audit
PPT
Harris Network Audit Pp
PDF
Inbound.org Technical SEO Audit
PDF
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014
PPT
Audit of it infrastructure
PDF
Network Architecture Review Checklist
PPT
3. security architecture and models
PPSX
2 Security Architecture+Design
PDF
How to do a Project Audit
DOCX
Audit Checklist for Information Systems
DOCX
Project audit & review checklist
Network Audit
Technology Audit
Harris Network Audit Pp
Inbound.org Technical SEO Audit
Quick Technical SEO Audit Checklist - Peter Handley Brighton SEO April 2014
Audit of it infrastructure
Network Architecture Review Checklist
3. security architecture and models
2 Security Architecture+Design
How to do a Project Audit
Audit Checklist for Information Systems
Project audit & review checklist
Ad

Similar to Network-Security-Audit (20)

PPTX
How to perform a network security audit for.pptx
PDF
PCI Compliance NOT for Dummies epb 30MAR2016
PDF
Chamber Technology Committee Presentation
PDF
The Legal Case for Cybersecurity
PPTX
Cyber Risks Implementation on an IP MPLS Network
PPT
Network Capability Profile
PPTX
PCI DSS Business as Usual (BAU)
PPTX
Network Security Forensics
PPTX
Increasing Challenges in Healthcare Privacy and Security
PPTX
Csa presentation november 2016 sloane ghx
PDF
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
PDF
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
PPT
Security Readiness Profile
PDF
Defcon 22-tim-mcguffin-one-man-shop
PPTX
Managing Multiple Assessments Using Zero Trust Principles
DOCX
1. Written assignmentscommunication must demonstrate professional.docx
PDF
Monotype Enterprise Complete Scan Report 2024
PPTX
10. Process: ocp cfops security and access
PPTX
Aligning Application Security to Compliance
PDF
f6_cyber_security_and_your_agency.pdf
How to perform a network security audit for.pptx
PCI Compliance NOT for Dummies epb 30MAR2016
Chamber Technology Committee Presentation
The Legal Case for Cybersecurity
Cyber Risks Implementation on an IP MPLS Network
Network Capability Profile
PCI DSS Business as Usual (BAU)
Network Security Forensics
Increasing Challenges in Healthcare Privacy and Security
Csa presentation november 2016 sloane ghx
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
Security Readiness Profile
Defcon 22-tim-mcguffin-one-man-shop
Managing Multiple Assessments Using Zero Trust Principles
1. Written assignmentscommunication must demonstrate professional.docx
Monotype Enterprise Complete Scan Report 2024
10. Process: ocp cfops security and access
Aligning Application Security to Compliance
f6_cyber_security_and_your_agency.pdf

More from Yigal Behar (8)

PDF
Hedge Fund Alert - Vendors List
PDF
January 2017 Printed Newsletter
PDF
December 2016 Printed Newletter
PDF
cybersecurity-in-the-c-suite-a-matt
PDF
HFA103013
PDF
fund-managers-on-the-hunt-1
PDF
Penetration-Testing
PDF
Incident-Response-Policy
Hedge Fund Alert - Vendors List
January 2017 Printed Newsletter
December 2016 Printed Newletter
cybersecurity-in-the-c-suite-a-matt
HFA103013
fund-managers-on-the-hunt-1
Penetration-Testing
Incident-Response-Policy

Network-Security-Audit

  • 1. 80 Broad Street, 5th Floor New York, NY 10004 www.2secure.biz info@2secure.biz Tel: 646-666-9601 Fax: 718-942-5355 Date: 10/13/2014 Case Study: NETWORK SECURITY AUDIT Preface: A Network Security Audit evaluates network devices for security settings and recommends changes to en- hance resilience and compliance. The Case: A Law Firm headquartered in New-York City with more than 10 worldwide branch locations, was looking to perform a Network Security Audit on its infrastructure. This audit followed 3 main phases: Discovery: Documenting devices with their Location, Model #, serial, MAC and management IP Network Diagrams: Create global and location based diagrams. Assessment: Management Access Best Practices  TACACS+ (highlight omissions)  SNMPv3 (highlight omissions)  Privilege levels (highlight omissions)  Line, console, VTY access  AAA functionality correct and operational  Support for SSHv2, no Telnet  Use of HTTPS and disable HTTP (if applicable) Assessment: Device Hardening Best Practices  Secure routing practices  Disable unused services and ports  Device plane hardening techniques  Infrastructure ACLs  Layer-2 security  Performance Recommendations Assessment: Network Policy Review  Validate current device OS software against known PSIRT advisories  Adherence with industry and regulatory requirements The above process was fully documented with a report that both Managers and Engineers understood. In Conclusion: Our experts delivered greater security, visibility and control over infrastructure while saving money. About 2Secure Corp 2Secure is a Cyber Security firm that takes a PROACTIVE approach to solving network problems. We provide the right tools to fix problems the first time around – in fact, we guarantee it!