

Users are the weakest link in any network security scenario. Some of the breakdowns may seem arbitrary, but you have to draw lines and break paragraphs at some point, and this is where we drew ours. We’ll break this list down into broad categories for your ease of reference. You’ll need to tweak this to suit your own environment, but rest assured the heavy lifting is done! That’s an important distinction no two networks are exactly the same, and business requirements, regulatory and contractual obligations, local laws, and other factors will all have an influence on your company’s specific network security checklist, so don’t think all your work is done. Using this checklist as a starting point, and working with the rest of your IT team, your management, human resources, and your legal counsel, you will be able to create the ultimate network security checklist for your specific environment.


This is a document to provide you with the areas of information security you should focus on, along with specific settings or recommended practices that will help you to secure your environment against threats from within and without. Submitted for your approval, the Ultimate Network Security Checklist-Redux version. So if you’re tasked with network security, either because you work on the IT security team, or perhaps you are the entire IT team by yourself, here is a simple list you can follow, broken down by category, which includes some tips and tricks for getting the job done. Well, a lot can change in the four years since we published that list, and not everyone reads our back catalog, so we wanted to freshen things up and make sure we cover all the bases as we bring this checklist forward for you. Back in February 2012, we published a checklist to help security admins get their network house in order.
