No

2-Security Office.webp

As you navigate the dimly lit corridors of the power plant, the urgency to secure the facility's digital backbone presses on you. You know you need to apply a critical security patch to the Palo Alto firewall. As you navigate the hallways, a distinct whir of high-pitched fans from servers and switches filters through a slightly ajar door, confirming your suspicions.

The server room stands before you, a crucial vault of the plant's operational intelligence and network security. As you push the door open, the rush of cool air laden with the scent of ozone and metal greets you. Racks of blinking servers and network equipment stretch out in rows, the heartbeat of the facility.

Before you can proceed with the patch you wonder about the assets that might be impacted. After all, a facility like this surely has an asset inventory somewhere, right?

Or do they?

Question 5: What framework mandates maintaining an inventory of all network assets to better manage security risks?




CTF sponsored by: