Network Documentation
Network Documentation
Network auditing may be a time-consuming chore that you probably don't have time
for. It's more than likely, however, that someone has already gone to the trouble and is
scanning your network for weak points to attack. It could be someone within your
organization; FBI statistics show that more than 60% of computer crimes originate
inside the enterprise. So remember that the best defense is a good offense, and you
cannot raise a good defense unless you know where your network is weak.
Before a network services audit can begin, a network inventory must be conducted.
An inventory includes collecting host identification information, such as IP address,
network interface hardware (NIC) address and DNS entries, for all network nodes.
While some of this information will be on hand in most environments, often it will
have errors. In most cases, NIC information and MAC addresses will not be recorded.
Even if you think you have the information, it's a good idea to conduct the inventory
and verify the information as a first step to an audit. This allows you to build a
complete picture of the environment and, as an additional benefit, will reveal
inconsistencies that should be cleaned up.
1. Use outside vendors to conduct and audit. This will ensure that there
is no favoritism or politics in the results, and provide credibility
covers the items listed below as a minimum. Find out who will be
conducting the audit and review resume and references from past
components.
network resources.
etc.
7. Review and assess network segmentation and identify and audit any
internal firewalls.
and ready?
plan.
10. Review and document all software licenses required/possessed for all
locations.
or installations.
#1--------------------------------------------------------------------------------------------------
#3--------------------------------------------------------------------------------------------------
#4--------------------------------------------------------------------------------------------------
#5--------------------------------------------------------------------------------------------------