We refer to your network configuration diagram, firewall policy, etc. and review the ACL on the desk, and generate pseudo traffic and do testing.
The firewall is important as the security of the border area of the network.
However, your information assets and systems may not be protected by a firewall. It means you are not protected from the attacks that can be defended by default due to firewall vulnerability, incomplete ACL, or misconfiguration.
We inspect the setting of best practice with reference to security standard such as Center for Internet Security Benchmark (CIS), National Institute of Standards and Technology (NIST), SANS etc., and compliance status of customer’s firewall policy.
The details of diagnosis (scope, contents, method, etc.) will be carried out after consultation with customers.