4 Secure Deployment Checklist
The following security checklist includes guidelines that help secure your device:
-
Ensure the workstation is physically and securely mounted to a stationary object.
-
Ensure all covers and security screws are installed.
-
Monitor system access.
-
Use Secure Boot.
-
Disable unused external I/O ports.
-
Enforce access controls effectively.
-
Lock and expire default or temporary user accounts used during installation.
-
Enforce password management.
-
Practice the principle of least privilege.
-
Grant necessary privileges only.
-
Do not use administrator accounts for daily operations.
-
Ensure unnecessary network shares have been removed.
-
-
Only install system components required for the use case.
-
Ensure remote access software has been disabled.
-
Use a firewall to restrict network access.
-
Use malware protection software.
-
Use drive encryption to protect data at rest.
-
Ensure the system receives operating system updates automatically.
-
Ensure the system receives virus definition updates automatically.