TrustedSec’s Architecture Review can safeguard your company

Is your architectural security changing at the speed of your business?

Organizations tend to view the network infrastructure as a “set it and forget it” initiative. However, as businesses change, so does the architectural landscape. Combined with the fact that there are new methods of attack introduced daily, network architectures should be reviewed on a regular basis to ensure adequate safeguards are in place.

The purpose of an Architecture Review is to confirm, from a security standpoint, that both new and old solutions are capable of offering a high level of confidentiality, integrity, and availability, as well as sufficient protection from attackers or insider threats. Using an inside-out approach, it proactively identifies security vulnerabilities within the architecture that could increase the likelihood of a breach to the organization.

TrustedSec’s Architectural Reviews are able to uniquely identify all possible improvements while balancing appropriate levels of security personnel needed to not only deploy the solutions but optimally provide long-term support and management. At the end of the engagement, TrustedSec provides a clear path for the necessary safeguards from the system of security controls in place, as well as any recommended expansion that can be incorporated into the environment to get the most value.


How an Architecture Review works

TrustedSec’s Architecture Review will lead your organization through a thorough assessment to evaluate each layer that forms the existing infrastructure to determine what level of protection is in place. The assessment ensures there is a baseline for the implementation and determines any potential adjustment or expansion of security controls to protect the organization.

This review process focuses on the following areas:

  • The overall design of the network environment, including conceptual materials, network diagrams, and technology placement
  • Documentation review, which includes policies, procedures, and standards
  • The protection mechanisms (e.g., multi-factor authentication, web application firewalls) that are in place to ensure confidentiality, integrity, and availability of the architecture
  • Network segmentation diagrams and proposed design implementation strategy to ensure effective isolation of systems
  • Appropriate encryption standards to ensure proper implementation around the protection of sensitive information
  • Whether adequate safeguards are in place to support the architecture (e.g., vulnerability management, monitoring and detection)