The objective is to ensure compliance with best practices and security recommendations regarding
network location and security assets (firewall, application firewall, probes, proxy, anti-virus
relay, messaging, etc.), partitioning, flows exchange, wireless networks, etc.
N.B. :
- The architecture audit can be extended to interconnections
with third-party networks, and in particular the Internet.
- The architecture audit cannot be dissociated from the
configuration audit because it makes it possible to deal with the neuralgic points of
information system architecture.
At the end of the audit, BEGONIA GROUP draws up a report which lists the positive points and areas
of improvement.