Review the procedure management system. Review security patches for network software. Review the penetration testing policy and process Test software Identify firewall holes