0% found this document useful (0 votes)
44 views1 page

Checklist ITSecurity en

This checklist summarizes IT security best practices for systems and devices. It includes ensuring operating systems, software, and firmware are up-to-date; changing all standard passwords to meet strength requirements; protecting against unauthorized access to panels, rooms, and connections; and removing temporary facilities. The backup system should be operating and tested with backups located separately from systems. All system configurations and redundant systems should be tested to ensure reliability.

Uploaded by

najib
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views1 page

Checklist ITSecurity en

This checklist summarizes IT security best practices for systems and devices. It includes ensuring operating systems, software, and firmware are up-to-date; changing all standard passwords to meet strength requirements; protecting against unauthorized access to panels, rooms, and connections; and removing temporary facilities. The backup system should be operating and tested with backups located separately from systems. All system configurations and redundant systems should be tested to ensure reliability.

Uploaded by

najib
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Check IT Security (Checklist)

CHECK Designation/work/test

All operating systems, software, and firmware are up-to-date (versions,


q
patches, security updates)

All standard passwords are changed on all devices, PCs, and servers, and at
q
the desired password strength

All panels, rooms, and connections are protected against unauthorized


q
access (access control, key concept, filter)

Temporary facilities are removed (e.g. WLAN, Internet access, flying cables,
q
temporary remote access, etc.)

q Cabling complies with the concept and labeling is clear and unique

q Documentation is drafted and complete

The backup system is operating (eventually automatically) and was tested,


q
backup is located in a different room from the system

All system configurations are backed up, restore is possible at any time, a
q
concept is drafted to this end

Redundant networks were seriously tested (back-up power, line and total
q
failure)

Redundant devices are not connected to the same backup, redundant power
q
supplies come from different sources

All alarming operates without error (monitoring UPS, servers, storage


q
systems, network devices, etc.)

For systems with direct access to the Internet:

CHECK Bezeichnung / Arbeiten / Test

All operating systems, software, and firmware are up-to-date (versions,


q
patches, security updates) and updated regularly

An up-to-date virus scanner with automatic signature updates is operating on


q
all PCs and servers

The firewall is configured and was tested, only those ports are open that are
q
actually used

Only secure protocols are used where possible, e.g. https instead of http,
q
IPSec, SSL, SSH, etc.

Optional: Access from the outside is controlled by switch or software, i.e. the
q system can only be reached from the outside (e.g. switching on the xDSL
modem) if the customer enables access

1/1

You might also like