- Device security policy written, approved, distributed, and reviewed on regular basis.
- Facilities (room, building, area) housing the devices secured—physical security.
- Password policies to ensure that good passwords are created that cannot be easily
guessed or hacked. - Password encryption used so that passwords are not visible when device configuration is
viewed. - Access methods such as Console, VTY, AUX using ACLs, and authentication mechanisms
secured. - Access methods such as SSH with AAA authentication chosen wisely.
- Unneeded services and protocols to be disabled.
- Unused interfaces shut down or disabled.
- Configuration hardened for network services and protocols in use (for example, HTTP
and SNMP). - Port and protocol needs of the network and use access lists to limit traffic flow
identified. - Access list for anti-spoofing and infrastructure protection and for blocking reserved and
private addresses considered. - Routing protocols established that use authentication mechanisms for integrity.
Appropriate logging enabled with proper time information. - Device's time of day set accurately, maintained with NTP.
4/7/08
Device Security Checklist
A security checklist is an important document containing a summary of various guidelines and instructions for secure implementations. Device security checklists can be viewed as templates for device lockdown and security implementation guidelines. You can use the following checklist as a quick summary and working guide to the cisco device security configuration.
How to Change JKS KeyStore Private Key Password
Use following keytool command to change the key store password >keytool -storepasswd -new [new password ] -keystore [path to key stor...
-
AIX Environment Procedures The best way to approach this portion of the checklist is to do a comprehensive physical inventory of the server...
-
Java Keytool Commands for Creating and Importing keystore files: These commands allow you to generate a new Java Keytool keystore file, crea...