NetArmor Sdn. Bhd. | Network Device Security Configuration Assessment
Introduction of NetArmor Sdn. Bhd.

NetArmor is a premier Managed Security Services Provider (MSSP) based in Singapore with offices in Malaysia that specialises in channel-driven cyber security solutions.

Led by industry experts, we’re committed towards empowering businesses and fortifying regional cybersecurity through our AI-driven, scalable solutions.

We work closely with resellers, Managed Service Providers (MSPs), and IT partners to ensure that the services provided meet our three criteria of quality: enterprise-grade protection, seamless operations, and adaptive in face of evolving cyber threats.

Network Device Security Configuration Assessment
Reviewing the configuration of critical network infrastructure such as routers, switches, firewalls, and load balancers to identify security gaps, misconfigurations, and deviations from best practices. In-Depth Device Configuration Review: Assesses configurations of routers, firewalls, switches, and more against security best practices. Industry Benchmark Alignment: Evaluates settings against standards like CIS Benchmarks, NIST, and vendor best practices. Access Control & Authentication Analysis: Reviews remote access methods (e.g., SSH, Telnet), password policies, and AAA configurations. Firewall Rule & ACL Review: Identifies overly permissive rules, unnecessary services, and rule conflicts. Logging, Monitoring & SNMP Security: Evaluates logging settings, SNMP versions used, and audit trail configuration. Change Management Review: Looks at version control, backup procedures, and unauthorized configuration changes.

Purpose: The primary goal is to helps strengthen perimeter defenses and reduce the attack surface.

Scope: Network devices: Routers, firewalls, switches, load balancers, VPN concentrators; Vendors covered: Cisco, Juniper, Palo Alto, Fortinet, Aruba, Check Point, etc.; Key focus areas: Device hardening and access controls, remote management protocols and secure access, ACLs, firewall rules, NAT/PAT policies, SNMP, NTP, syslog configurations, firmware/OS versions and patch levels, backup and recovery processes, high availability and failover configurations.  

Methodology: Testers conduct a detailed review of network device configurations, comparing them against best practices and security standards. The assessment includes checking for common misconfigurations, weak credentials, unnecessary open ports, and insufficient logging or alerting.

Types of External Penetration Tests

Black Box: No prior knowledge of device configurations; simulating an external attacker.

Grey Box: Partial knowledge or limited credentials provided to assess device configurations.

White Box: Full access to device configurations and network architecture (if provided).

CLICK HERE to view the detailed user guide for more information. For more information about the product, please visit the Product Page.