Network Security Checklist
Firewalls (Hardware/Software)
Default Credentials Changed (admin/admin → strong password)
Latest Firmware/Software Installed
Only Required Ports Opened (block unused)
Ingress and Egress Rules Defined Clearly
Geo-IP Filtering (if needed)
Rules Ordered from Most to Least Specific
Logging Enabled and Monitored
ICMP Echo Request Filtering (if needed)
NAT and PAT Configured Properly
Access Control Lists (ACLs) in Place
VPN Traffic Segmented and Restricted
Fail2Ban or IDS/IPS Integration
Firewall Management Interface Restricted by IP or Network
Backup of Firewall Configuration Stored Securely
Time-Sync Enabled (NTP) for Logging Accuracy
Multi-Zone (DMZ, Internal, External) Segregation Used
Routers
Change Default Login Credentials
Disable Unused Interfaces and Services (e.g., Telnet)
SSH Enabled, Telnet Disabled
Secure SNMP Configuration (use v3)
ACLs to Limit Management Access
OSPF/EIGRP/RIP Authentication Enabled
No Public IP Assigned to Internal Interfaces
VPN Setup Uses IPsec or SSL
Logging and Monitoring Enabled
Regular Firmware Updates
Routing Tables Audited for Anomalies
Use Secure NTP and DNS Servers
Syslog Remote Logging Configured
Router Boot Configuration Stored Securely
Switches
Management VLAN Separated from User VLANs
Unused Ports Disabled
Port Security Enabled (MAC Address Binding)
BPDU Guard Enabled on Access Ports
STP (Spanning Tree Protocol) Configured and Tuned
802.1X Port Authentication Configured
DHCP Snooping Enabled
Dynamic ARP Inspection Enabled
Private VLANs (if applicable) Used for Isolation
Logging to Central Syslog Server
SSH Access Only for Management
SNMPv3 or Disable SNMP if Unused
CDP/LLDP Disabled on Access Ports
Regular Backup of Switch Configs
Linux Servers
All Packages Up-to-Date (apt/yum/dnf)
Only Required Services Running (
systemctl
,chkconfig
)Firewall Configured (UFW, firewalld, iptables/nftables)
SSH Hardening:
Disable root login
Use key-based authentication
Change default port (optional)
Fail2Ban or SSHGuard installed
User Accounts Reviewed
Sudo Access Limited
Audit Logs Enabled (
auditd
,rsyslog
)Intrusion Detection (e.g., OSSEC, AIDE)
File Permissions Audited
SELinux or AppArmor Enabled
Login Banners and Legal Notices in Place
Automatic Security Updates Configured
Sensitive Data Encrypted (at rest and transit)
Cron Jobs Audited
Monitor Processes and Open Ports (
ps
,netstat
,ss
)
Windows Servers
Windows Updates Applied Regularly
Antivirus and Antimalware Active (Defender or 3rd-party)
Local Firewall (Windows Defender Firewall) Configured
SMBv1 Disabled
RDP Access Restricted:
Use Network Level Authentication (NLA)
Use VPN or IP whitelisting
Two-Factor Authentication (Duo, etc.)
Event Logging Enabled and Reviewed
Group Policy Hardened:
Password policies (length, history, lockout)
Disable anonymous logins
Remove local admin access from users
PowerShell Logging and Auditing Enabled
Unused Roles and Features Removed
Active Directory Hardening (if domain controller):
Audit logons and privilege use
Disable legacy protocols (NTLMv1, LM)
LAPS configured for local admin password management
BitLocker or EFS for Disk Encryption
USB and External Device Policy Controlled
Remote Admin Tools Access Logged and Restricted
Backup System and Restore Testing Verified
Use of Security Baselines (CIS, Microsoft Security Compliance Toolkit)