Checklist ITSecurity en
Checklist ITSecurity en
CHECK Designation/work/test
All standard passwords are changed on all devices, PCs, and servers, and at
q
the desired password strength
Temporary facilities are removed (e.g. WLAN, Internet access, flying cables,
q
temporary remote access, etc.)
q Cabling complies with the concept and labeling is clear and unique
All system configurations are backed up, restore is possible at any time, a
q
concept is drafted to this end
Redundant networks were seriously tested (back-up power, line and total
q
failure)
Redundant devices are not connected to the same backup, redundant power
q
supplies come from different sources
The firewall is configured and was tested, only those ports are open that are
q
actually used
Only secure protocols are used where possible, e.g. https instead of http,
q
IPSec, SSL, SSH, etc.
Optional: Access from the outside is controlled by switch or software, i.e. the
q system can only be reached from the outside (e.g. switching on the xDSL
modem) if the customer enables access
1/1