Network Architecture Security Review

During a network architecture review, Praetorian will evaluate the security of your organization's network architecture and infrastructure. Existing network diagrams and network documentation will be reviewed and interviews with network security analysts, network engineers, and network architects will be conducted in order to confirm documentation and answer outstanding questions. The network architecture review will evaluate the function, placement, and gaps of existing security controls and compare their alignment with the organization's security goals and objectives.

Methodology for Network Architecture Reviews

The overall network architecture review assesses personnel, processes, and technologies currently in place to protect infrastructure assets and identifies any gaps in asset protection. Results will be measured against recommended best practices and against what is typically found at other organizations of similar function, size, and target value. Based on the findings of the assessment, Praetorian will provide tactical and strategic recommendations for those areas in need of improvement.


The process will review and assess strengths and weaknesses of the security architecture and will examine the following major components:

  • Key security architecture design assumptions
  • Current network topology
  • Inventory of existing security technologies
  • Network access controls and network segmentation
  • Third party and partner integration and access
  • Gap analysis of missing, incomplete, or improperly implemented security controls

What You Get

Upon completion of the assessment Praetorian shall provide a single electronic report deliverable. The report will provide an analysis of the current state of the assessed security controls. The analysis will identify areas that need to be resolved in order to achieve an adequate level of security. The detailed contents of the deliverable are described below.


The report deliverable will include the following high level sections in a format suitable for management:

  • Purpose of the engagement including project's scope and approach
  • Positive security controls that were identified
  • Tactical resolutions to immediately reduce risk in the environment
  • Strategic recommendations for preventing similar issues from recurring
  • An industry comparison based on consultancy experience and results from similar previous engagements

The report deliverable will also include the following in-depth analysis and recommendations for technical staff to understand the underlying risks and recommendations:

  • A technical description and classification of each vulnerability
  • Anatomy of exploitation including steps taken and proof in the form of screenshots
  • Business or technical risk inherent in the vulnerability
  • Vulnerability classification that describes the risk level as a function of vulnerability impact and ease of exploitation
  • Technical description of how to mitigate the vulnerability


Ready to get started?

Contact us at 1 (800) 675-5152 to get started with your Network Architecture Review needs, or request a callback by submitting the form below.