Where your Network Ends: Discovering the Perimeter
Our client wanted us to develop a standard, Web-app security architecture. We identified the Web-apps that were exposed to the internet – the client’s de-facto perimeter. As a result of this inventory, we were able to produce an architecture for them that mitigated the current, and potential, security risks.
Finally, we put together a security Web-app policy that outlined the client’s security risk position and their risk acceptance stance.