Network security is the first line of defence for your entire IT estate. A weak perimeter, flat network, or misconfigured VPN can allow an attacker to move laterally from a compromised endpoint to your most sensitive systems. This checklist covers perimeter, internal segmentation, remote access, and continuous monitoring.
On this page
Firewall Rules Audit Checklist
Firewall rule bloat is a security risk
Firewalls that have never been properly reviewed accumulate hundreds of "any-to-any" rules from legacy projects. Each permissive rule is an attack surface. Audit annually at minimum.
Network Segmentation & VLAN Review
VPN & Remote Access Security
Wireless Network Security Checklist
Network Monitoring & Intrusion Detection
Free tools for network monitoring
Zeek (formerly Bro) + Security Onion gives you a free, powerful IDS/network security monitoring stack. Wazuh provides SIEM functionality with network decoder support.