Table of Contents

Advertisement

2.5 Checklist

This section provides a sample checklist to help guide the process of securely deploying IPC2018 IPC products.
1.
Create or locate a network diagram.
2.
Identify and record the required communication paths between nodes.
3.
Identify and record the protocols required along each path, including the role of each node.
4.
Revise the network as needed to ensure appropriate partitioning, adding firewalls or other network security devices as
appropriate. Update the network diagram. (Refer to the chapter
Configure firewalls and other network security devices
5.
6.
Enable and/or configure the appropriate security features on each module.
7.
For each module, change every supported password to something other than its default value.
8.
Harden the configuration of each module, disabling unneeded features, protocols and ports.
9.
Test/qualify the system.
10. Create an update/maintenance plan.
Note Secure deployment is only one part of a robust security program. This document, including the checklist above, is
limited to only providing secure deployment guidance. For more information about security programs in general, refer to the
section
Additional
Guidance.
10
GFK-3015
For public disclosure
Network Architecture and Secure
IPC2018 IPC Secure Deployment Guide
Deployment.)

Advertisement

Table of Contents
loading

Table of Contents