The objective is to assess the security of a company's internal network in the event of attacks from a hacker who has managed to reach the intranet or attacks originating from internal company personnel.
The internal network audit focuses on evaluating the security of the perimeter protection systems located within a company's internal network (routers and firewalls separating subnets, etc.), as well as the different systems located on that network (host systems, file servers, printing servers, web servers, email servers, news servers, etc).
Two possible scenarios are considered:
Provides a detailed view of the security status of the internal network.
By connecting a system to the internal network, an attempt is made to gain access to servers and privileged information located on this network.
Simulates the actions of a hacker who has penetrated the internal network.
Simulates the actions of an employee attempting to use internal network resources for which they do not have permissions.
Uses the same methodology and techniques as in Penetration Tests, except that now attacks are carried out from within the internal network.
Includes a review of the company's security policy.
Applies specific local network techniques (Network monitoring, ARP spoofing, private IP spoofing, etc.).
The audit is carried out at the client's premises.
- High‑level executive summary.
- Details of all tests performed, specifying their objective.
- Results obtained from the different tests carried out.
- Recommendations to most effectively resolve the identified security issues.
- Classification of security issues according to their severity level. This allows the company to develop an efficient action plan to address these security problems.
- Meeting aimed at explaining the audit results and advising on possible solutions for the identified security issues.