1
0%

IT Governance

IT governance sets the foundation for an enterprise’s IT security posture. It requires an IT Steering Committee, IT policies, procedures, standards and guidelines and performance measures and metrics.

Select all that apply to your organization:

N/A
Next
2
0%

WAN/MAN

Remote Organization Location

Wide area networks are primarily associated with organizations that have multiple remote physical locations requiring direct connections to the enterprise’s core network. This section focuses on security and controls surrounding WAN and MAN.

Select all that apply to your organization:

Back
N/A
Next
3
0%

Internet

Internet Presence

All organizations have an Internet presence, Internet access, and third-party connections, such as cloud providers and strategic partners. This section focuses on the security and controls surrounding an organization’s Internet presence.

Select all that apply to your organization:

Back
N/A
Next
3
0%

Internet

Remote User Access

All organizations have an Internet presence, Internet access, and third-party connections, such as cloud providers and strategic partners. This section focuses on the security and controls surrounding an organization’s Internet presence.

Select all that apply to your organization:

Back
N/A
Next
3
0%

Internet

Site-to-Site VPN

All organizations have an Internet presence, Internet access, and third-party connections, such as cloud providers and strategic partners. This section focuses on the security and controls surrounding an organization’s Internet presence.

Select all that apply to your organization:

Back
N/A
Next
3
0%

Internet

Cloud Providers (e.g., Office365, Box, Google, and Salesforce)

All organizations have an Internet presence, Internet access, and third-party connections, such as cloud providers and strategic partners. This section focuses on the security and controls surrounding an organization’s Internet presence.

Select all that apply to your organization:

Back
N/A
Next
3
0%

Internet

Remote Vendor Access

All organizations have an Internet presence, Internet access, and third-party connections, such as cloud providers and strategic partners. This section focuses on the security and controls surrounding an organization’s Internet presence.

Select all that apply to your organization:

Back
N/A
Next
4
0%

ISP and Next-Generation FIREWALL

Internet Router – ISP Managed

All organizations with Internet access have an Internet service provider (ISP) and a firewall to protect them from bad actors on the Internet. This section provides important security and controls related to the ISP and the Internet-facing next-generation firewall.

Select all that apply to your organization:

Back
N/A
Next
4
0%

ISP and Next-Generation FIREWALL

Next-Generation Firewall

All organizations with Internet access have an Internet service provider (ISP) and a firewall to protect them from bad actors on the Internet. This section provides important security and controls related to the ISP and the Internet-facing next-generation firewall.

Select all that apply to your organization:

Back
N/A
Next
5
0%

Web Application

Web Application Firewall

Many organizations enable customers to interact with them via a web application. Securing web applications has become a critical component of securing an enterprises overall technology environment. This section provides basic controls for securing web applications.

Select all that apply to your organization:

Back
N/A
Next
5
0%

Web Application

User Provisioning

Many organizations enable customers to interact with them via a web application. Securing web applications has become a critical component of securing an enterprises overall technology environment. This section provides basic controls for securing web applications.

Select all that apply to your organization:

Back
N/A
Next
6
0%

Core Router and WIFI

CORE ROUTER

In this section, we begin to evaluate the internal network. A properly configured core router/switch is the start of a secure internal computing environment.

Select all that apply to your organization:

Back
N/A
Next
6
0%

Core Router and WIFI

Enterprise WIFI Network

In this section, we begin to evaluate the internal network. A properly configured core router/switch is the start of a secure internal computing environment.

Select all that apply to your organization:

Back
N/A
Next
7
0%

Active Directory

Active Directory

Typically, a network has a directory service technology, such as Active Directory, and a network access control (NAC) solution. In addition, there is an access layer switch and defined user VLANs. This section provides important security and controls related to Active Directory, NAC solution, and access layer switching.

Select all that apply to your organization:

Back
N/A
Next
7
0%

Active Directory

NAC

Typically, a network has a directory service technology, such as Active Directory, and a network access control (NAC) solution. In addition, there is an access layer switch and defined user VLANs. This section provides important security and controls related to Active Directory, NAC solution, and access layer switching.

Select all that apply to your organization:

Back
N/A
Next
7
0%

Active Directory

Distribution-Layer Switch

Typically, a network has a directory service technology, such as Active Directory, and a network access control (NAC) solution. In addition, there is an access layer switch and defined user VLANs. This section provides important security and controls related to Active Directory, NAC solution, and access layer switching.

Select all that apply to your organization:

Back
N/A
Next
7
0%

Active Directory

User VLAN

Typically, a network has a directory service technology, such as Active Directory, and a network access control (NAC) solution. In addition, there is an access layer switch and defined user VLANs. This section provides important security and controls related to Active Directory, NAC solution, and access layer switching.

Select all that apply to your organization:

Back
N/A
Next
8
0%

Server Farm VLAN

Server Farm vLAN

The final section of this high-level hardened enterprise network assessment focuses on enterprise applications and network storage. Effective data security is one of an enterprise’s most valuable assets. These questions provide insight into how the enterprise protects its data.

Select all that apply to your organization:

Back
N/A
Next
8
0%

Server Farm VLAN

Enterprise Applications

The final section of this high-level hardened enterprise network assessment focuses on enterprise applications and network storage. Effective data security is one of an enterprise’s most valuable assets. These questions provide insight into how the enterprise protects its data.

Select all that apply to your organization:

Back
N/A
Next
8
0%

Server Farm VLAN

Enterprise Storage

The final section of this high-level hardened enterprise network assessment focuses on enterprise applications and network storage. Effective data security is one of an enterprise’s most valuable assets. These questions provide insight into how the enterprise protects its data.

Select all that apply to your organization:

Back
N/A
Next

ASSESSMENT COMPLETED!

Thank you for completing the high-level assessment.

We hope you find this information helpful in improving the security posture of your technology environment. If you have any questions, please contact us.

IT governance sets the foundation for an enterprise’s IT security posture. It requires an IT steering committee; IT policies, procedures, standards, and guidelines; and performance measures and metrics.
BACK to assessment
Wide and metropolitan area networks (WANs and MANs) are used by organizations with multiple remote physical locations requiring direct connections to the core enterprise network. This section focuses on security measures and controls around WANs and MANs.
BACK to assessment
All organizations have an Internet presence, Internet access, and third-party connections, for example, to cloud providers and strategic partners. This section focuses on the security and controls surrounding an organization’s Internet presence.
BACK to assessment
Every organization with Internet access has an Internet service provider (ISP) and a firewall (ideally, a next-generation model) to protect IT assets from external threats. This section provides important security measures and controls related to the ISP and the Internet-facing firewall.
BACK to assessment
Many organizations use web applications to interact with customers. As such, web applications are a critical component of the overall technology security posture. This section focuses on basic web-application security controls.
BACK to assessment
In this section, we evaluate your internal network security posture with questions about core router and WiFi configurations. Properly configuring the core router and wireless controller is critical to a secure internal computing environment.
BACK to assessment
The final section of the assessment focuses on enterprise applications and network storage. These questions provide insight into the effectiveness of your data security measures.
BACK to assessment
The typical enterprise network has a directory service technology, such as Active Directory, a network access control (NAC) solution, and an access-layer switch with defined user VLANs. This section provides security measures and controls related to Active Directory, NAC, and access-layer switching.
BACK to assessment