Cyber Security Audit & Optimization

Cybersecurity threats are inevitable and unpredictable. Enterprises must have a cybersecurity strategy to deal with risks to prevent future breaches and mitigate their impact. Fermorite assists firms in developing a customized cyber strategy that aligns people, processes, and technology with enterprise business priorities and risks.

Designing a cyber security strategy is complex task for most firms as it must address a dynamic environment. Fermorite consultants work to create a cyber security strategy to create operational efficiencies, maximum return on technology investments, and greater data protection.

Identify & Protect

Identify and protect key items what matters most

Develop

Develop a roadmap, bringing a greater level of security maturity

Recommend

Recommend best practices to help firms better execute their security program

Implement

Implement the cyber security strategy

Design of secure logical network architecture. Based on the as-is analysis of the existing network audit results, a secure and layered network architecture design is recommended. The design utilizes vendor and industry best practices for network traffic isolation, intrusion detection management, IPv6 compatibility, role-based access control and performance optimization.

Design of infrastructure component high availability and disaster recovery. Fermorite recommends a network design which assume a redundant and fault tolerant approach. This ensures that there are no single points of failure throughout the infrastructure. Also, recommendations are provided for dealing with potential physical or operational disasters in order to ensure operational and business continuity.  

Optimization of logical access control. The audit highlights any weaknesses and vulnerabilities with regards to granting of access to networking appliances and configurations for unauthorized personnel. Optimized firewall-based rule access lists are recommended if applicable. These aim at balancing application layer functionality and compatibility with minimum attack surfaces on the networking components.

Optimization of physical access control. The audit highlights any potential gaps in physical network equipment, wireless access points and cabling access exposed to unauthorized users. 

Planning of physical and logical access monitoring procedures. As part of the audit, a series of physical and logical access monitoring procedures is recommended.  

Planning of security incident management procedures. A set of security incident management procedures are recommended. This set covers the logging, classification, remediation and security team communication procedures. 

Re-design of switching and routing protocol configurations and security patch management. Based on vendor and industry best practices, networking appliance configuration baselines are created and secure patch application and management procedures are recommended.

Planning for perimeter and endpoint security. A series of recommendations are provided in order to enforce the networking perimeter security with endpoint security measures.