Pre-installation General Considerations
Before product installation, it is important that each of the following items are considered:
-
Networking: Virtual and physical interfaces, bridged and routed
-
User roles: Operator and administrator and others, view or modify or delete
-
Password rules: length and character requirements, other characteristics
-
Cryptographic algorithms: allowed or mandated, usage guidelines
-
Patch or update process security: limitations, roles allowed to execute procedures
This is not an exhaustive list. The more things that can be planned ahead of time, the better.