Policy Bypass
Audit checks for weaknesses in firewall rules that could allow unauthorized traffic to slip through.
Denial-of-Service (DoS)
Audit assesses if the firewall can withstand attacks aimed at overwhelming it and disrupting network services.
Man-in-the-Middle (MitM)
Audit identifies vulnerabilities that could allow attackers to intercept communication between devices.