Skip to content
Salus Cyber

Infrastructure Testing

Network Segregation

Ensure your networks are appropriately segregated.

Ensure your sensitive infrastructure is unreachable from malicious actors by conducting a network segregation assessment.

A network segregation assessment is designed to identify potential security gaps, evaluate existing network security measures, and provide recommendations for improving network segregation to strengthen the organisation’s overall security posture.

During a network segregation assessment, a Salus Cyber consultant will evaluate the network architecture, access controls, and other security measures to ensure that sensitive infrastructure and critical systems are separated from different parts of the network. In addition, the effectiveness of implemented restrictions will be assessed by attempting to interact with protected infrastructure from untrusted areas such as guest Wi-Fi networks and non-sensitive networks.

This type of test is commonly used in environments where segregation is paramount, such as the boundary between cardholder data environments or development networks and corporate networks.

First Line Dark


A network segregation assessment can provide confidence in the organisation’s resilience against a network breach. Highly sensitive data is less susceptible to compromise if stored in an unreachable area.


Network isolation is likely the only adequate method of secure operation for business-required infrastructure running on obsolete hardware or software. A network segregation assessment could ensure whether a legacy device is practically exploitable.


Creating a completely segregated network is a highly complex and time-consuming process, and as little as a single device bridging networks together could compromise the whole effort. A network segregation assessment greatly facilitates the process of finding gaps in protection.


Unauthorised access is one of the leading security challenges faced by organisations. A network segregation assessment can provide insight into how deep into the network an unauthorised entity could get based on the resources they could interact with.

How we work

Customer Journey

  1. Identify

    First, we take time to familiarise ourselves with your business. This allows us to clearly understand your requirements, your business risks, your key pain-points, and the outcomes you’re looking for.

  2. Understand

    We turn those requirements into crystal-clear scoping and test plan documents, so you know precisely what we’ll be doing, when we will be doing it, and how we will do it.

  3. Test

    We deliver what we promised.

  4. Inform

    Every report we create is unique based on your business, we don’t use cookie cutter data for our summaries or our remediation plans. Our precise and concise findings brief will advise what steps your business needs to take next to reduce cyber risk.

  5. Remediate

    We can ensure that the remediation process is tracked and coordinated within your business, we will allocate resources to point you in the right directions or if you need our help directly with remediation, we’ve got you covered.

  6. Feedback

    Your opinion is important to us, so we send a questionnaire to every one of our customers after each project – so you can let us know how we did.

Request a call back