read

The fastest way to make an infrastructure security review useful is to move the conversation away from impressions and toward a shared model of the system. This checklist is designed to help reviewers ask consistent questions about identity, network exposure, operational resilience, and the controls that protect the highest-value paths through an environment.

That usually starts with a diagram. Not a perfect diagram. Not a vendor architecture slide. Just enough shared truth that everyone in the room can point at the same boundary, workload, identity path, or data flow and agree what it means.

My cheap and cheerful starting point for infrastructure review is:

  • Get a diagram.
  • Break the system into trust zones.
  • Draw the data flows.
  • Draw the management and administration flows.
  • Label each important asset, threat, and control.

That looks simple, but it prevents a lot of bad review habits. Without a diagram, people tend to review the system they imagine rather than the one that exists.

Start with the system shape

Before talking about controls, make sure the review can answer basic questions:

  • What are the externally reachable entry points?
  • What networks, subscriptions, accounts, tenants, or domains are involved?
  • Which workloads process sensitive data?
  • Which identity providers and privileged roles can administer the system?
  • What third parties, SaaS services, and automation systems are trusted?
  • Where are logs generated, stored, and reviewed?
  • What breaks if one dependency disappears?

The goal is not to shame the team for missing a beautiful diagram. The goal is to uncover ambiguity. Ambiguity is where security assumptions hide.

Identify trust zones

Trust zones are places where the rules change. Examples include:

  • Internet-facing services.
  • Internal-only services.
  • Administrative networks.
  • Production and non-production environments.
  • Identity systems.
  • CI/CD and automation platforms.
  • Data stores containing customer, employee, or regulated data.

Once the trust zones are visible, review the boundaries between them. A boundary is interesting when something crosses it: a user login, an API call, a database connection, a deployment pipeline, a backup process, or an administrator session.

For each boundary, ask:

  • What authenticates the request?
  • What authorizes it?
  • Is the traffic encrypted?
  • Is access restricted to the minimum required source and destination?
  • Is there logging at the boundary?
  • What would an attacker gain by crossing it?

Separate data flows from admin flows

Teams often diagram customer or application traffic and forget management traffic. That is a mistake.

For data flows, focus on:

  • Data classification.
  • Storage locations.
  • Encryption in transit and at rest.
  • Backup and restore paths.
  • Retention requirements.
  • Who can query or export the data.

For admin flows, focus on:

  • Privileged identity and role assignment.
  • Break-glass access.
  • Remote administration paths.
  • Deployment tooling.
  • Secrets and credential storage.
  • Logging and alerting for privileged actions.

Many serious incidents come through the management plane rather than the application plane. If CI/CD can deploy to production, or an admin role can read every secret, that path deserves the same attention as an Internet-facing API.

Map threats to controls

A review becomes useful when it connects plausible threats to concrete controls.

For each important asset, write down:

  • What could go wrong?
  • What prevents it?
  • What detects it?
  • What limits the blast radius?
  • Who gets alerted?
  • What is the recovery path?

For example, if the asset is a production database, the review might cover network exposure, identity permissions, backup integrity, administrator access, audit logging, and export controls. If the asset is a build pipeline, the review might cover repository permissions, signing keys, runner isolation, dependency integrity, and deployment approvals.

Useful review prompts

These questions usually shake something loose:

  • What is the easiest way for a developer to accidentally expose this?
  • What is the easiest way for an administrator to bypass the intended control?
  • What secrets exist, where are they stored, and how are they rotated?
  • What accounts or systems have standing privileged access?
  • Which logs would prove that this control worked?
  • What would we restore from if this environment was destroyed?
  • What is intentionally out of scope, and who accepted that risk?

Output matters

The review should leave behind something useful:

  • An updated diagram.
  • A list of assumptions.
  • A list of risks with owners.
  • A list of accepted risks.
  • Follow-up actions that are small enough to complete.
  • Links to evidence, not just opinions.

The best review notes are boring in a good way. They show what was reviewed, what was found, what will change, and what risk remains.

The short version

If you only have 30 minutes, do this:

  1. Draw the system.
  2. Mark the trust boundaries.
  3. Trace user, data, admin, and deployment flows.
  4. Identify the highest-value assets.
  5. Ask what prevents, detects, and contains compromise.
  6. Write down the gaps and owners.

There is always more depth available, but this checklist is enough to make an infrastructure security review concrete. The diagram gets everyone into the same room mentally; the trust boundaries show where to focus; and the controls discussion turns vague concern into work someone can actually do.

References

Blog Logo

Chad Duffey


Published

Image

Chad Duffey

Blue Team -> Exploit Development & things in-between

Back to Overview