4.1 Typical System Topology

The reference topology for an enterprise audit and forensics platform is organized around three security zones with clearly defined data flows, trust boundaries, and access control points. This three-zone model has been validated across multiple enterprise deployments and provides the optimal balance between evidence integrity, operational efficiency, and administrative control.

The topology is designed to ensure that all evidence flows are unidirectional from production to security zones, that no production system can directly access or modify evidence storage, and that all administrative access to any zone is mediated through the bastion server in the management zone. This architecture eliminates the most common evidence integrity failure modes: direct admin access to log storage, shared credentials between production and security zones, and unmonitored administrative pathways.

Typical System Topology Diagram
Figure 4.1: Typical System Topology — Three-zone architecture with NTP server, production network (Zone 1), security zone (Zone 2), and management zone (Zone 3) with data flow arrows
ZoneComponentsNetwork SegmentAccess ControlData Flow Direction
Zone 1: ProductionServers, AD/LDAP, Databases, Apps, DNS/DHCP, HypervisorsProduction VLAN (10.x.x.x/16)Standard enterprise ACLs; outbound log onlyOutbound only → Zone 2 collectors
Zone 2: SecurityLog Collectors, Message Bus, SIEM, SOAR, Evidence Vault, KMS/HSMSecurity VLAN (172.16.x.x/24)Deny-by-default; inbound log + outbound management onlyInbound from Zone 1; internal pipeline; no outbound to Zone 1
Zone 3: ManagementBastion/PAM, Admin Workstations, Break-Glass AccountsManagement VLAN (192.168.x.x/24)MFA required; all sessions recorded; admin-only accessBidirectional to Zone 1 and Zone 2 via bastion only

4.2 Deployment Models

Three deployment models are supported, each optimized for different organizational profiles and infrastructure constraints. The selection of deployment model determines the physical placement of components, the network architecture requirements, and the operational procedures for evidence collection and management.

ModelProfileArchitectureKey ConsiderationsRecommended Scale
Centralized On-PremisesSingle DC, high-security environmentsAll components in dedicated security rack; dedicated security VLAN; physical separationLowest latency; highest control; requires dedicated hardware budget500–5,000 endpoints
Hybrid (On-Prem + Cloud)Multi-site with cloud workloadsOn-prem collectors + cloud-native SIEM; cloud evidence vault (S3/Azure Blob with object lock)Cloud API integration required; cross-region replication for DR; data residency compliance2,000–20,000 endpoints
Distributed with Central SOCMulti-site enterprise; remote branchesLightweight collectors at each site; WAN-optimized transport to central SIEM; central evidence vaultWAN bandwidth sizing critical; local buffering for connectivity failures; site-level bastion5,000–20,000 endpoints

4.3 Capacity Planning

Accurate capacity planning is essential for ensuring that the platform can sustain evidence collection under all conditions, including peak load events such as security incidents, batch processing windows, and audit periods. The following table provides reference sizing parameters for the three deployment scales supported by this design guide. Use the calculators in Chapter 9 for precise sizing based on your specific environment.

ParameterSmall (500–2K endpoints)Medium (2K–8K endpoints)Large (8K–20K endpoints)
Baseline EPS2,000–8,000 EPS8,000–32,000 EPS32,000–80,000 EPS
Peak EPS (incident)5× baseline5× baseline3× baseline
Hot Storage (90 days)5–20 TB20–80 TB80–200 TB
Cold Archive (7 years)50–200 TB200–800 TB800 TB–2 PB
PCAP Retention7 days egress only14 days egress + critical zones30 days multi-zone
Collector Nodes2 (N+1)4–6 (N+1)8–16 (N+1 per site)
SIEM Index Nodes3 (HA cluster)6–9 (HA cluster)12–24 (HA cluster)
Evidence Vault2 nodes (mirrored)4 nodes (erasure coded)6+ nodes (erasure coded)

4.4 Physical Equipment Wiring & Rack Layout

Physical rack layout and cable management are critical for operational reliability and evidence integrity. Proper cable organization ensures that management, data, and storage networks are physically separated, reducing the risk of accidental cross-connection and simplifying troubleshooting. The reference rack design places all security platform components in a dedicated rack or cage with physical access controls.

Equipment Rack Wiring Diagram
Figure 4.2: Equipment Rack Wiring Diagram — Physical rack layout showing log collectors, message bus servers, SIEM nodes, evidence vault arrays, KMS/HSM appliance, and bastion with color-coded cable management
Cable TypeColor CodeNetworkSpeedConnector
ManagementBlueManagement VLAN (OOB)1GbERJ45 Cat6
Log CollectionGreenLog ingest network10GbESFP+ DAC or fiber
StorageRedStorage fabric (FC/iSCSI)16/32G FC or 25GbE iSCSILC fiber or SFP28
Out-of-Band ManagementOrangeIPMI/iDRAC/iLO network1GbERJ45 Cat6
Inter-node ClusterGraySIEM/vault cluster heartbeat25GbESFP28 DAC