Network Hardware

Risks, Vulnerabilities and Threats 

  • Hardware loss due to inventory manipulation or management errors
  • Significant online outage
  • Misconfiguration of network architecture, firewalls, intrusion detection, load balancers, individual switches
  • Incomplete network mapping and device information

 

Control Objectives and Operational Goals

  • Well-constructed network asset management inventory and processes
  • Continuous monitoring of network traffic seeking anomalies and intentional attacks
  • Use of network mapping to assure security of enterprise information traveling on the network