Infrastructure Security · IS-Q24B

Bonus Question: Is there a process to regularly review and update network security architecture based on emerging threats or technology shifts?

Why This Matters

Technology evolves rapidly; outdated architectures create blind spots. Regular reviews align defenses with new attack techniques and business needs.

Maturity

0 — Unaware
No review of architecture since initial deployment.
1 — Ad Hoc
Reviews occur only after incidents.
2 — Defined
Annual review schedule established.
3 — Managed
Threat intelligence informs architecture changes.
4 — Integrated
Architecture reviews linked to risk assessments and audits.
5 — Optimized
Continuous architecture improvement via automation and simulation.

How to Level Up

| From → To | Actions | |—|—| | 0 → 1 |Document current network design.|
| 1 → 2 |Set annual architecture review cadence.|
| 2 → 3 |Use threat reports to recommend changes.|
| 3 → 4 |Integrate findings with enterprise risk reviews.|
| 4 → 5 |Automate architecture validation with modeling tools.|

Enablers

Evidence

KPIs

Low-Cost / Open-Source Options (MSME)

| Purpose | Tool | Notes | |—|—|—| | Diagram validation | Draw.io + review checklist | Version tracking |
| Threat input | MISP / OpenCTI | Feed correlation |
| Change tracking | Airtable / Git | Audit of updates |

Common Pitfalls

Compliance Mapping

| Standard | Clauses / Notes | |—|—| | ISO/IEC 27001 | A.5.30 / A.10.1 | | NIST CSF 2.0 | GV.MA / PR.PT | | CERT-In 2022 | Section 12 | | NIRMATA Mapping | IS-Q24B concludes Infrastructure Security bonus set with continuous-improvement governance. |