Page 128 - Courses
P. 128

IT Essentials — Assessing Infrastructure and Networks
























            DMZ Placement Within a Network
            Source: IIA GTAG: “IT Essentials for Internal Auditors”

            Does that mean that devices that only pass through one of the two firewalls are not as protected as
            the devices on our internal network?

            Yes. As you can see, all our critical servers and databases are behind the second firewall. Only client-
            facing webservers and devices that perform authentication and inspection are located in the DMZ.

            Network Challenges and Risks

            Networks have many components, and each organization will have a unique network structure.
            Having an effective network can significantly impact an organization’s operations. An internal
            auditor’s understanding of the network architecture is key to understanding the risks and challenges
            associated with the networks. There are numerous challenges/risks related to an organization’s
            network that internal auditors should be aware of, which can include but are not limited to:

            Ensuring proper identification of all external-facing services provided by the organization.

            Ensuring sufficient network security.
                 Ensuring that network components are secured and configured according to organizational
                   policies that are aligned to applicable regulations and industry best practices.
                 Monitoring the dark web for compromised emails/passwords and verifying that passwords
                   are changed frequently.
                 Ensuring appropriate anti-malware and anti-phishing software are deployed.
                 Conducting mandatory employee awareness training.

            Ensuring appropriate access.
                 Ensuring that access to switches is restricted and that technicians routinely maintain and
                   update them for functionality. Switch ports should be continuously monitored and unused
                   ports should be disabled.




            Copyright © 2020 by The Institute of Internal Auditors, Inc. All rights reserved.
   123   124   125   126   127   128   129   130   131   132   133