Network Infrastructure Document
Detects network infrastructure documentation revealing topology, VLANs, firewall rules, and attack surface.
- Type
- keyword_list
- Confidence
- medium
- Confidence justification
- Medium confidence: keyword-based detection requires corroborative evidence for accurate identification.
- Jurisdictions
- au
- Regulations
- SOCI Act 2018 (Cth), TIA Act 1979 (Cth)
- Frameworks
- CIS Controls, DISP, ISO 27001, NIST CSF, SOC 2
- Data categories
- technology, security
- Scope
- narrow
- Risk rating
- 8
Should match
Network topology diagram with VLAN configuration and firewall rule details— Test match 1Network architecture document: DMZ, air gap, and access control list— Test match 2Infrastructure diagram showing network boundary and network segmentation— Test match 3
Should not match
Social network analysis— Non-match 1Network of contacts in the industry— Non-match 2
Known false positives
- Social or business network references. Mitigation: Require IT infrastructure terms like VLAN, DMZ, or firewall rule.