Security audit of a high-security infrastructure by means of design review, penetration tests and red teaming