237
vulnerability assessment
networking configuration may provide access to unauthorized users,
which is specifically concerning due to weak authorization capabilities
within many of the field devices.
Tools to assist in the review of network configurations and firewall
rule sets are critical to the assessment process due to their relative dif-
ficulty of interpretation and the heavy interconnectivity between vari-
ous devices. Fortunately, some tools have been developed to assist in
this task. e Network Access Policy Tool (NetAPT) is the result of
research efforts to automate the interpretation of network configurations
and verify that they meet some previously assumed network policy.
13
Future research should expand current tools to incorporate
increa ...