Can you limit the IPs accessing ‘s instance of the server?
Can you limit the IPs accessing ‘s administrative console?
Are external network vulnerability assessments conducted?
Are cables and telecommunication infrastructure used in conjunction with the service protected from interception?
Do you use a firewall on the network?
Do you use an active IPS system on the network?
Do you use a Web Application Firewall on the network?
Do you use a Database Application Firewall on the network?
What network traffic protocols are supported?
Do you use less than 128 bit network encryption keys?
- 1
- 2