Network Security Checklist

4.8/5 with 384 votes
0/58
Toggle General status

General

Toggle Develop a Security Policy detailing rights and responsibilities of staff, patrons, and contract users status

Develop a Security Policy detailing rights and responsibilities of staff, patrons, and contract users

Toggle Develop a Acceptable Use Policy (AUP) developed for patrons and staff status

Develop a Acceptable Use Policy (AUP) developed for patrons and staff

Toggle Train staff not to reveal system passwords to anyone other than specified individuals status

Train staff not to reveal system passwords to anyone other than specified individuals

Toggle Train staff not to allow anyone access to systems and network equipment without authorization status

Train staff not to allow anyone access to systems and network equipment without authorization

Toggle Require companies performing maintenance/configuration to sign a disclosure agreement status

Require companies performing maintenance/configuration to sign a disclosure agreement

Toggle Physical & Data Security status

Physical & Data Security

Toggle Lock servers and network equipment. status

Lock servers and network equipment.

Toggle Rotate one backup set offsite regularly and store in a secure location status

Rotate one backup set offsite regularly and store in a secure location

Toggle Secure Keys used for securing equipment or media status

Secure Keys used for securing equipment or media

Toggle Keep computers visible status

Keep computers visible

Toggle Use locks on computer cases status

Use locks on computer cases

Toggle Perform regular inspections. status

Perform regular inspections.

Toggle Password Security status

Password Security

Toggle Develop written password security policy status

Develop written password security policy

Toggle Develop written instructions in creating strong passwords status

Develop written instructions in creating strong passwords

Toggle Store password documentation in secure location status

Store password documentation in secure location

Toggle Workstation Security status

Workstation Security

Toggle Require logon at each workstation status

Require logon at each workstation

Toggle Configure workstations with private IP addresses to be either static or dynamic status

Configure workstations with private IP addresses to be either static or dynamic

Toggle Remove unnecessary/unused files and programs status

Remove unnecessary/unused files and programs

Toggle Install anti-virus software on all workstations status

Install anti-virus software on all workstations

Toggle Schedule anti-virus software Updates 2 times per week status

Schedule anti-virus software Updates 2 times per week

Toggle Schedule software updates 1 time per week status

Schedule software updates 1 time per week

Toggle Schedule Operating System updates 1 time per week. status

Schedule Operating System updates 1 time per week.

Toggle Install Pop up blockers status

Install Pop up blockers

Toggle LAN/Domain Server Security status

LAN/Domain Server Security

Toggle Remove unnecessary services status

Remove unnecessary services

Toggle Remove unnecessary files/programs status

Remove unnecessary files/programs

Toggle Configure file system with proper file/folder access permissions status

Configure file system with proper file/folder access permissions

Toggle Disable anonymous user logon information status

Disable anonymous user logon information

Toggle Configure account policy to restrict unauthorized logon attempts status

Configure account policy to restrict unauthorized logon attempts

Toggle Block account after too many failed logon attempts status

Block account after too many failed logon attempts

Toggle Create administrators to perform different functions status

Create administrators to perform different functions

Toggle Limit remote administrator rights status

Limit remote administrator rights

Toggle Disable administrator rights on remote server status

Disable administrator rights on remote server

Toggle Configure Remote Access Service security status

Configure Remote Access Service security

Toggle Rename Administrator Account status

Rename Administrator Account

Toggle Configure auditing of Administrator account logon attempts status

Configure auditing of Administrator account logon attempts

Toggle Set a strong password for current administrator/root account status

Set a strong password for current administrator/root account

Toggle Use different passwords for domain/server accounts than for local workstation accounts status

Use different passwords for domain/server accounts than for local workstation accounts

Toggle Restrict access permissions for the Everyone group status

Restrict access permissions for the Everyone group

Toggle Disable Guest account if enabled status

Disable Guest account if enabled

Toggle Create appropriate user and group accounts status

Create appropriate user and group accounts

Toggle Set appropriate group access permissions status

Set appropriate group access permissions

Toggle Configure audit logs to track unauthorized access to files/folders/accounts status

Configure audit logs to track unauthorized access to files/folders/accounts

Toggle Schedule periodic download and installation of operating system patches status

Schedule periodic download and installation of operating system patches

Toggle Network Equipment Security status

Network Equipment Security

Toggle Record and secure any password settings created by staff or contractor status

Record and secure any password settings created by staff or contractor

Toggle Configure audit logs properly, if available status

Configure audit logs properly, if available

Toggle Schedule periodic installation of firmware updates status

Schedule periodic installation of firmware updates

Toggle Router/Firewall Security status

Router/Firewall Security

Toggle Use firewall; public services (web/ftp/e-mail) are provided on separate network segment, the DMZ status

Use firewall; public services (web/ftp/e-mail) are provided on separate network segment, the DMZ

Toggle Implement network address translation (NAT), if possible status

Implement network address translation (NAT), if possible

Toggle Configure router to deny inbound access to unused ports status

Configure router to deny inbound access to unused ports

Toggle Configure firewall so no packets with source addresses outside the LAN are allowed into the LAN, but only to DMZ status

Configure firewall so no packets with source addresses outside the LAN are allowed into the LAN, but only to DMZ

Toggle Firewall uses stateful packet inspection, providing protection against denial-of-service attacks and IP spoofing status

Firewall uses stateful packet inspection, providing protection against denial-of-service attacks and IP spoofing

Toggle Schedule periodic installation of firmware updates status

Schedule periodic installation of firmware updates

Download or Print this Network Security Checklist

Get a printable version of this checklist in your preferred format: PDF, Word, Excel, or print directly from your browser.

Presented by:

Alex Strickland

Alex Strickland

Stats

Views

194

Uses

30

Tasks

58

Introduction

Our Network Security Checklist provides a structured approach to safeguarding your organization's digital assets. With clear guidelines on policies, training, and technical configurations, this template helps you establish a robust security framework. By utilizing our Checklist App, you can save and customize the checklist to fit your unique needs. Stay updated with real-time sync across devices and collaborate seamlessly with your team to ensure that all security measures are effectively implemented and monitored.

Who it's for

This Network Security Checklist is for teams that want consistent execution, less rework, and clear ownership.

  • Standardize quality - run the same Network Security steps every time, regardless of who executes
  • Save time - reuse a proven Network Security workflow instead of rebuilding processes from scratch
  • Improve accountability - assign owners and see what's done vs. what's pending
  • Onboard faster - use the Network Security checklist as the SOP and training guide
  • Coordinate across roles - handoffs are clear and everyone works from the same source of truth

How to use it

How to use this Network Security Checklist:

  1. Start by saving it - save as a Template if you'll reuse it, or as a Checklist if it's a one-off project.
  2. Customize it once for your workflow - remove what doesn't apply and add your team-specific steps.
  3. Assign ownership and execute - set owners/due dates where needed and track completion as work happens.
  4. Reuse without rebuilding - when Network Security comes up again, start from your saved version and run it with clear ownership.

Suggest Improvements

Rate this Checklist

5 stars
Scores 4.80 with 384 votes

Not finding exactly what you need?

Generate a custom checklist with AI in seconds.

Works on Web, iOS, and Android. No credit card required.