官术网_书友最值得收藏!

Data flow diagram

Data flow diagrams are probably one of the most important documents a penetration tester/assessor/auditor can have. The job of a data flow diagram is to show the flow of important data within the organization. The data can be of different types, including credit card information, proprietary company information, or even personally identifiable information (PII). Understanding how this type of data flows in the network, and which systems it interacts with, will allow you to help the penetration tester understand where to focus. This is important as this is where the hackers will focus as well.

Some organizations do not typically have this type of documentation. We have seen many companies having to generate these data flow diagrams while going through an audit or assessment of some sort. But most organizations should have data flow diagrams within the organization for any important data flows.

A great outcome of the penetration test is that this type of documentation may end up being verified by the penetration tests to show its accuracy. Documentation is often a low priority at most companies, unfortunately, so being able to keep it up to date is important.

Here is an example of a data flow diagram of a sample company we created, showing credit card information flowing throughout the network:

主站蜘蛛池模板: 赤水市| 德安县| 阿克陶县| 台东县| 沈丘县| 德化县| 双城市| 泗洪县| 广元市| 湖南省| 东丽区| 甘泉县| 铜鼓县| 望城县| 都兰县| 昭觉县| 和林格尔县| 常州市| 鹤峰县| 游戏| 轮台县| 抚远县| 历史| 澄江县| 日喀则市| 屏山县| 景宁| 河曲县| 牙克石市| 抚顺市| 河间市| 澄城县| 卫辉市| 蒙阴县| 苍溪县| 镇原县| 云和县| 柳州市| 新乡市| 伊通| 永善县|