官术网_书友最值得收藏!

Data flow diagram

Data flow diagrams are probably one of the most important documents a penetration tester/assessor/auditor can have. The job of a data flow diagram is to show the flow of important data within the organization. The data can be of different types, including credit card information, proprietary company information, or even personally identifiable information (PII). Understanding how this type of data flows in the network, and which systems it interacts with, will allow you to help the penetration tester understand where to focus. This is important as this is where the hackers will focus as well.

Some organizations do not typically have this type of documentation. We have seen many companies having to generate these data flow diagrams while going through an audit or assessment of some sort. But most organizations should have data flow diagrams within the organization for any important data flows.

A great outcome of the penetration test is that this type of documentation may end up being verified by the penetration tests to show its accuracy. Documentation is often a low priority at most companies, unfortunately, so being able to keep it up to date is important.

Here is an example of a data flow diagram of a sample company we created, showing credit card information flowing throughout the network:

主站蜘蛛池模板: 乐业县| 新宁县| 图片| 荆州市| 儋州市| 万州区| 响水县| 永安市| 江津市| 天祝| 长顺县| 保康县| 胶州市| 体育| 白朗县| 青冈县| 酒泉市| 禹州市| 出国| 景德镇市| 邯郸市| 勃利县| 会东县| 天津市| 河南省| 且末县| 南和县| 三门县| 桂东县| 合山市| 绵阳市| 门头沟区| 介休市| 林州市| 盐津县| 大姚县| 阳城县| 临漳县| 班戈县| 吴堡县| 宜宾县|