The Enterprise Architecture Assessment is the foundation upon which the technical evaluation of an enterprise security program is based. The goal is to evaluate, from a technical perspective, the maturity of various components of an enterprise’s information security program. The process starts with requests for network diagrams and device configurations (routers, switches, firewalls, etc.) to evaluate against common security holes, misconfigurations and vulnerabilities associated with network design and configuration management practices. The balance of the process mirrors the Cybersecurity Program Assessment but from a technical perspective rather than a process/procedure perspective.
We interview stakeholders to evaluate security controls around the following areas as they relate to the overall risk management process:
- Perimeter Security
- Network Segmentation, Design, and Security
- Host Security
- Application, Patch, and Configuration Management
- Tactical Implementation of Administrative Security