Threats

What threats are applicable to your services?

The following questions should be asked:

  1. What processing do?
    1. Personal data
    2. business
      1. Manufacturing
      2. ERP
      3. Stock Management
      4. Accountancy
      5. ...
  2. Is there homework?
  3. smartphone access
    1. What applications are used on the smartphone?
  4. Is there internal segregation in the network?
    1. Camera
    2. Desktop
    3. Server
    4. HVAC ...
  5. Cloud services: the cloud services organization uses
    1. E-mail
    2. Website
    3. file Storage
    4. Microsoft365
    5. ...
  6. Which of the following measures are available
    1. VLAN
    2. How is the format: each functionality, location ...?
    3. proxy
      1. servers
      2. workstations
    4. firewall
      1. Base
        1. Network-based
        2. Host-based
      2. On the border of
        1. External
          1. What services should be accessible from outside it?
          2. For what audience?
        2. Internal between VLANs?
    5. VPN
      1. Connections inward
      2. population
        1. users
        2. Support (technical ...)
    6. camera installation
    7. servers
      1. fileserver
      2. application
      3. ...
    8. workstations
      1. hardening
      2. Functional distinction?
    9. networking devices
      1. Printer
      2. scanners
      3. ...
    10. Inventory
      1. processing
      2. Policies
      3. VPN connections
      4. firewall rules
      5. proxy rules
      6. VLAN configurations
      7. Cameras
    11. Desktop
Last modified: Monday, 23 August 2021, 10:46 AM