Audit Network Checklist Whitepaper
Audit Network Checklist Whitepaper
Audit a Network
Printable Whitepaper
Checklist
Introduction
What’s covered in
Network Audit Checklist
1. Company Policies
this guide:
2. Password security
3. Network/LAN security
4. Workstations
5. Mobile devices
7. Routers/Firewalls
Auditing a network is a hugely important task for MSPs, IT professionals, and
any other service provider. That’s why we wrote a completely free downloadable
Introduction
checklist on auditing a network.
Our handy checklist will help ensure you’ve got the important aspects of
auditing a network covered.
Check out our free network onboarding template!
Download our MSP onboarding checklist with a free printable template. Our
Need to onboard a free onboarding template covers everything from A-Z you need to consider
when onboarding a new network. Moreover, it’s very useful for onboarding new
Audit?
minimize potential issues and risks.
01.
important components that ensure the
overall security and functionality of the
network infrastructure.
General Auditing: Network Auditing (LAN):
General auditing involves assessing the overall security posture of the network. Network auditing for the local area network (LAN) focuses on assessing the
This includes evaluating the network's architecture, identifying potential security and performance of the internal network infrastructure. This involves
vulnerabilities, and assessing compliance with security policies and standards. It reviewing network segmentation, access control mechanisms, and intrusion
may involve reviewing network diagrams, analyzing network configurations, and detection systems (IDS) or intrusion prevention systems (IPS). Network auditing
conducting interviews with network administrators. also includes analyzing network traffic patterns, monitoring for unauthorized
network access, and identifying any potential network bottlenecks or
performance issues.
Password Security Auditing:
Device Auditing:
Mobile Phone Auditing:
Device auditing involves evaluating the security configurations and settings of
network devices such as routers, switches, and access points. This includes Mobile phone auditing focuses on assessing the security of mobile devices
reviewing device configurations to ensure they adhere to security best that connect to the network. This includes evaluating the implementation of
practices, identifying any unnecessary services or ports that could pose mobile device management (MDM) solutions, enforcing strong authentication
security risks, and verifying the implementation of encryption protocols. Device mechanisms, and ensuring devices are running the latest firmware and security
auditing also entails checking for firmware updates and patches to ensure updates. Mobile phone auditing may also involve reviewing app permissions,
devices are running the latest secure versions. data encryption practices, and remote wipe capabilities in case of loss or theft.
Critical Network Infrastructure Auditing:
Server/Firewall Auditing:
02.
with performance and detecting issues too.
Even more importantly, it can help with identifying potential areas of a business
that could be at risk of network security issues and cyber attacks.
Moreover, the entire process of auditing a network will help you identify areas
of the network that need proper practices in place. For example, you may be
missing a BYOD policy or alerts on new devices. Auditing a network will help
you identify your weaknesses and what is missing to further improve your
network management and security processes. Check out our handy document
on CIS controls for more details on this.
Auditing a network gives you an entire picture of your network, policies, and
practices. You can use this picture to identify your strengths and weaknesses
and areas that need improvement.
Benefits of auditing
a Network Auditing a network has many benefits
which are relevant to your organization,
customers, policies and procedures. Here
are some of the benefits of regularly
03.
auditing your networks.
Security Asset Management
IT network audits help identify vulnerabilities and weaknesses in the network IT network audits help organizations maintain an accurate inventory of their
infrastructure, systems, and devices. They’ll also help you identify cyber risks: network assets, including servers, routers, switches, firewalls, and other
malware, spyware, phishing, virus threats. This can be done through regular devices. Audits ensure that assets are adequately documented, including their
risk assessments and by implementing security measures such as firewalls, physical location, ownership, and relevant configurations. This information is
antivirus software, and intrusion detection systems.Additionally, regular audits crucial for effective IT asset management, license compliance, maintenance
of your IT systems and processes help you identify risks to accessing sensitive scheduling, and resource planning.
information and data.
Business Continuity
Compliance/maintaining CIS control
Network audits assess the network's resilience and ability to handle
Many industries and organizations are subject to regulatory requirements unexpected events, such as power outages, hardware failures, or natural
and compliance standards, such as the Health Insurance Portability and disasters. By identifying single points of failure, redundant systems, and backup
Accountability Act (HIPAA), Payment Card Industry Data Security Standard strategies, audits help organizations implement robust business continuity
(PCI DSS), or General Data Protection Regulation (GDPR). IT network audits plans. This ensures critical network services and operations can be quickly
help assess whether the organization's network aligns with these regulations restored, minimizing downtime and potential financial losses.
and standards. Audits provide evidence of compliance and help organizations
avoid penalties, legal issues, and reputational damage associated with non-
compliance. Check out our handy document on CIS controls for more details Risk Management
on this. IT network audits play a crucial role in identifying and managing risks associated
with the network infrastructure. Audits help organizations identify and prioritize
risks, develop mitigation strategies, and establish appropriate risk management
Performance and Efficiency
frameworks by assessing the network's architecture, controls, and processes.
Network audits evaluate the network infrastructure, including hardware, This enables organizations to make informed decisions regarding risk tolerance,
software, configurations, and overall architecture. By assessing network investment in security measures, and overall risk mitigation efforts.
performance, audits identify bottlenecks, congestion points, or outdated
components that may hinder network efficiency. Audits also help optimize
network resources, identify opportunities for improvement, and ensure that the
network meets the organization's performance requirements.
Identify Gaps and Improvements
A regular self-assessment can help you identify areas where you excel and
areas where you could improve. This is crucial to improving your networking
operations over time. A regular self-assessment can also help you review
your current policies and procedures to identify any gaps or areas that need
improvement. You can then work with your team to develop new policies and
procedures.
A regular self-assessment will help you make sure that everything on your
network has been set-up correctly and is functioning as it should be. Through
each audit, you’ll really dive into monitoring network traffic, ensuring that all
devices are up-to-date with the latest security patches, and implementing
firewalls and other security measures as part of the process. The end result
is that you can ensure the functioning of a network is still being maintained.
Additionally, you’ll be able to regularly check that everything is set-up correctly.
04.
annual basis.
As an MSP, you may perform network audits to onboard a new network. Then
after, you may perform them regularly for your clients.
Internal IT team
If you are part of an IT team, your team may be tasked with continuously
auditing the networks you manage. This could be a single network or multiple,
Even if you are an MSP or part of an Internal IT team, you may choose to have
an external auditor perform a network audit. Having an extra set of eyes
on everything you’re doing is always a good idea. External auditors will be
thorough and objective. They aren’t familiar with the network and will not have
access to any shortcuts or bypassing of rules because they know the system.
Additionally, often Security Frameworks require the need for external auditors
to validate that your security process is being followed and up to the standards
that you have set.
Network Audit
Checklist To undergo a full network audit, we’ve
compiled a checklist with all the steps you
can follow for each area.
05.
DESCRIPTION STATUS
1 Company Policies
Network policy - ensure there is a network security policy. If no policy is available, draft one. Include the rights and responsibilities of
all team members, employees, consultants, contractors, and guests in the policy. Review any existing policy and amend it as needed.
Data sharing policy - ensure there is a data sharing policy. If no policy is available, draft one. Review any existing policy and amend it
as needed.
Acceptable use policy - ensure there is an acceptable use policy. If no policy is available, draft one. Review any existing policy and
amend it as needed.
Bring Your Own Device (BYOD) policy - ensure there is a BYOD policy. If no policy is available, draft one. Review any existing policy
and amend it as needed.
Security training - ensure all employees have completed security training and reviewed and accepted all critical documentation: data
sharing, acceptable use, BYOD, etc.
Information sharing training - ensure all employees have completed training on information sharing.
Vendor policy acceptance - review the vendor security agreement. Ensure that all vendors have signed the security agreement.
Data security/breach plan - ensure there is a plan in place for a data or security breach happens. If no plan is drafted, this is a
great time to draft one.
DESCRIPTION STATUS
Password training - ensure all users have completed appropriate password training and know the risks.
Inspect physical environments - physically inspect the workstations of employees and check for passwords that
may be written down.
Documenting password requirements - keep a document of password requirements somewhere accessible anytime for all employees.
DESCRIPTION STATUS
3 Network/LAN Security
Strengthen the internal network servers.
Check server permissions - ensure they are appropriate for all users and circumstances.
Ensure there is a remote administration policy in place. Review and amend as needed.
Create appropriate AD-privileged user groups. Monitor them as necessary. You can Monitor AD-privileged user groups with Domotz.
Create appropriate Windows GPOs. Monitor them as necessary. You can Monitor Windows GPOs with Domotz.
DESCRIPTION STATUS
3 Network/LAN Security
Set up Windows security events and monitor them as necessary. You can Monitor Windows security events with Domotz.
4 Workstations
Lock Screen - ensure there is a lock screen on all computers.
Ensure that anti-virus software is installed and working for each user.
Ensure that RMM software is installed and working for each user.
Ensure that software updates are automatically implemented on workstations through Windows Update Agent (WUA). You can use
Domotz for WUA monitoring.
5 Mobile Devices
Ensure that you have new device alerts set up on the network. Get real-time alerts when new devices connect. Hint: you
can use Domotz for new device alerts.
Ensure there is a BYOD policy in place. Review any existing policy and amend it as needed.
Enforce the BYOD policy through new device alerts and blocking devices at the firewall level.
DESCRIPTION STATUS
Ensure network configuration management is in place for critical network infrastructure where possible. You can use Domotz for
network configuration management.
Document network configurations. You can also use Domotz to back up/restore your network appliance configurations.
Document network topology. You can use Domotz for automated network topology mapping.
Perform LAN perimeter scans and external WAN perimeter scans. You can use Domotz for your LAN/WAN scans.
DESCRIPTION STATUS
7 Routers/Firewalls
Ensure a firewall is being used.
Ensure that all external IP addresses are not allowed on the LAN and only on the segmented network.
Configure firewall policies. You can also monitor firewall policies with Domotz using our pre-configured SNMP templates for
Watchguard, Sophos, and Fortinet.
Scan for opened ports and close them as needed. You can use Domotz TCP Open Port Scanner for this.
Identify whether UPnP is enabled on the Router / Modem and whether any device on the network is leveraging UPnP to open ports
and redirect the traffic. You can use Domotz network security scanner for this.
7 Routers/Firewalls
Implement packet inspection of network traffic where possible.
Use network configuration management for router and firewall. Ensure firmware and software are updated regularly and automatically
where possible. You can use Domotz for network configuration management.