ISO 27001 Router Security Audit Checklist: Yes No Router Policy
ISO 27001 Router Security Audit Checklist: Yes No Router Policy
Finding ISO
s 27001
Questions Yes No Control
Router Policy
Is a router security policy in place? A.5.1.1
A.11.4.1
Disable Unneeded Services
Are unused interfaces disabled?
A.11.4.4
Is DNS lookups for the router turned
off? A.11.5.4
A.12.6.1
A.11.4.4
Is Cisco Discovery Protocol disabled on A.12.6.1.
the router?
A.11.4.4
A.11.5.4
A.12.6.1
Is Bootp server disabled on the routers?
A.12.6.1
A.10.1.1
A.11.2.1
A.10.10.1
A.10.6.1
If yes,
· Is the TFTP process restricted
to certain addresses only?
· Is the TFTP service disabled
when not in use? A.10.6.1
Is there a documented procedure for
backup of router configurations? A.10.5.1
Router Change Management
Are all router changes and updates
documented in a manner suitable for
review according to a change
management procedure? A.10.1.2
Router Redundancy
Is there a router redundancy in cold
standby or hot standby? A.14.1.3
Are disaster recovery procedures for A.14.1.3
the router/network documented and A.14.1.5
are
Logthey tested? and Incident Handling
monitoring
Are all attempts to any port, protocol,
or service that is denied logged? A.13.1.1
Is the CPU utilization/memory of the
router monitored? A.10.10.2
A.10.10.1
A.13.1.1
source: iso27001security.com
t Checklist
Standard/Best Practice
A documented procedure for creation of
administrators on the router should exist.
The procedure should address:
· Approval from the department head
· Recording the authorization level
given to the new administrator and the
duration
Each router administrator should have a
unique account for him/her to maintain
accountability.
The following commands can be executed to
create unique local usernames on the
router:
Router(config)#username username
password password
Router(config)#line vty 0 4
Router(config-line)#login local
A detailed log of every command typed on
the router as well as when an administrator
logged in or out can be recorded for audit
purposes.
Router(config)#aaa accounting exec default
start-stop group tacacs+
Router(config)aaa accounting commands 15
default start-stop group tacacs+
All user accounts should be assigned the
lowest privilege level that allows them to
perform their duties.
The NTP service which is disabled by default
helps to synchronize clocks between
networking devices thereby maintaining a
consistent time which is essential for
diagnostic and security alerts and log data.
However if configured insecurely, it could
used to corrupt the time clock of the
network devices. To prevent this, restrict
which devices have access to NTP.
The service should also be disabled if not
used.
Syslog messages allows for easy
troubleshooting of the network.
Use the following commands to enable
syslog
Router(config)#logging syslog-ip-address
Router(config)#service timestamps log
datetime localtime msec show-timezone
The network engineer should receive
periodic updates on the vulnerabilities and
patches affecting the router.