Checklist: Securing Your Network
| Retired Content |
|---|
This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |
J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan
Microsoft Corporation
Published: June 2003
See the "patterns & practices Security Guidance for Applications Index" for links to additional security resources.
See the Landing Page for the starting point and a complete overview of Improving Web Application Security: Threats and Countermeasures.
Contents
How to Use This Checklist Router Considerations Firewall Considerations Switch Considerations
How to Use This Checklist
This checklist is a companion to Chapter 15, "Securing Your Network." Use it to help secure your network, or as a quick evaluation snapshot of the corresponding chapters.
This checklist should evolve as you discover steps that help implement your secure network.
Router Considerations
| Check | Description |
|---|---|
![]() | Latest patches and updates are installed. |
![]() | You subscribed to router vendor's security notification service. |
![]() | Known vulnerable ports are blocked. |
![]() | Ingress and egress filtering is enabled. Incoming and outgoing packets are confirmed as coming from public or internal networks. |
![]() | ICMP traffic is screened from the internal network. |
![]() | Administration interfaces to the router are enumerated and secured. |
![]() | Web-facing administration is disabled. |
![]() | Directed broadcast traffic is not received or forwarded. |
![]() | Unused services are disabled (for example, TFTP). |
![]() | Strong passwords are used. |
![]() | Logging is enabled and audited for unusual traffic or patterns. |
![]() | Large ping packets are screened. |
![]() | Routing Information Protocol (RIP) packets, if used, are blocked at the outermost router. |
Firewall Considerations
| Check | Description |
|---|---|
![]() | Latest patches and updates are installed. |
![]() | Effective filters are in place to prevent malicious traffic from entering the perimeter |
![]() | Unused ports are blocked by default. |
![]() | Unused protocols are blocked by default. |
![]() | IPsec is configured for encrypted communication within the perimeter network. |
![]() | Intrusion detection is enabled at the firewall. |
Switch Considerations
| Check | Description |
|---|---|
![]() | Latest patches and updates are installed. |
![]() | Administrative interfaces are enumerated and secured. |
![]() | Unused administrative interfaces are disabled. |
![]() | Unused services are disabled. |
![]() | Available services are secured. |
| Retired Content |
|---|
This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist. |

