- Penetration Testing Bootcamp
- Jason Beltrame
- 218字
- 2021-07-02 21:35:55
Data flow diagram
Data flow diagrams are probably one of the most important documents a penetration tester/assessor/auditor can have. The job of a data flow diagram is to show the flow of important data within the organization. The data can be of different types, including credit card information, proprietary company information, or even personally identifiable information (PII). Understanding how this type of data flows in the network, and which systems it interacts with, will allow you to help the penetration tester understand where to focus. This is important as this is where the hackers will focus as well.
Some organizations do not typically have this type of documentation. We have seen many companies having to generate these data flow diagrams while going through an audit or assessment of some sort. But most organizations should have data flow diagrams within the organization for any important data flows.
A great outcome of the penetration test is that this type of documentation may end up being verified by the penetration tests to show its accuracy. Documentation is often a low priority at most companies, unfortunately, so being able to keep it up to date is important.
Here is an example of a data flow diagram of a sample company we created, showing credit card information flowing throughout the network:

- 多媒體CAI課件設計與制作導論(第二版)
- Getting Started with React
- Python自然語言處理實戰:核心技術與算法
- Python爬蟲開發:從入門到實戰(微課版)
- Learn Scala Programming
- JavaScript+Vue+React全程實例
- Android 應用案例開發大全(第3版)
- Apache Mesos Essentials
- Scala謎題
- Learning Hunk
- Laravel Application Development Blueprints
- ASP.NET 4.0 Web程序設計
- jQuery Mobile Web Development Essentials(Second Edition)
- C語言從入門到精通(微視頻精編版)
- Qt編程快速入門