官术网_书友最值得收藏!

Data flow diagram

Data flow diagrams are probably one of the most important documents a penetration tester/assessor/auditor can have. The job of a data flow diagram is to show the flow of important data within the organization. The data can be of different types, including credit card information, proprietary company information, or even personally identifiable information (PII). Understanding how this type of data flows in the network, and which systems it interacts with, will allow you to help the penetration tester understand where to focus. This is important as this is where the hackers will focus as well.

Some organizations do not typically have this type of documentation. We have seen many companies having to generate these data flow diagrams while going through an audit or assessment of some sort. But most organizations should have data flow diagrams within the organization for any important data flows.

A great outcome of the penetration test is that this type of documentation may end up being verified by the penetration tests to show its accuracy. Documentation is often a low priority at most companies, unfortunately, so being able to keep it up to date is important.

Here is an example of a data flow diagram of a sample company we created, showing credit card information flowing throughout the network:

主站蜘蛛池模板: 东山县| 南开区| 社会| 常宁市| 洞头县| 定结县| 汶川县| 兴城市| 会宁县| 洪洞县| 偏关县| 离岛区| 阳春市| 灌云县| 密云县| 枝江市| 青铜峡市| 永福县| 颍上县| 筠连县| 荆州市| 黄平县| 德兴市| 江孜县| 手游| 万载县| 正宁县| 芜湖县| 益阳市| 长顺县| 宽城| 土默特左旗| 哈巴河县| 武城县| 镇远县| 乌拉特前旗| 汨罗市| 旅游| 繁峙县| 赤壁市| 彝良县|