Network Security Architecture Review
We begin by learning about the organisation’s business objectives and control objectives. We then assess the network's design, key components, protocols, and data flow to and from the network and the core technologies upon which the network depends to achieve its security goals and compare them to applicable standards, laws/regulations, and best practices.