Security architecture and network infrastructure (e.g. firewall rule set review, logging and monitoring capability, network segregation etc.);