2.5
Checklist
This section provides a sample checklist to help guide the process of securely deploying IPC2018 IPC products.
1.
Create or locate a network diagram.
2.
Identify and record the required communication paths between nodes.
3.
Identify and record the protocols required along each path, including the role of each node.
4.
Revise the network as needed to ensure appropriate partitioning, adding firewalls or other network security devices as
appropriate. Update the network diagram. (Refer to the chapter
Network Architecture and Secure Deployment
.)
5.
Configure firewalls and other network security devices
6.
Enable and/or configure the appropriate security features on each module.
7.
For each module, change every supported password to something other than its default value.
8.
Harden the configuration of each module, disabling unneeded features, protocols and ports.
9.
Test/qualify the system.
10.
Create an update/maintenance plan.
Note
Secure deployment is only one part of a robust security program. This document, including the checklist above, is
limited to only providing secure deployment guidance. For more information about security programs in general, refer to the
section
Additional Guidance
.
10
GFK-3015
IPC2018 IPC Secure Deployment Guide
For public disclosure
Summary of Contents for IPC2018
Page 1: ...GFK 3015 IPC2018 Industrial PC IPC Secure Deployment Guide June 2017 For public disclosure ...
Page 6: ...Notes 6 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...
Page 8: ...Notes 8 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...
Page 12: ...Notes 12 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...
Page 14: ...Notes 14 GFK 3015 IPC2018 IPC Secure Deployment Guide For public disclosure ...
Page 17: ......