HP Commercial LaserJet Printers and MFPs - Imaging and Printing Security Best Practices

Chapter 2 HP LaserJet and Color LaserJet MFP Security Checklist 6
You can minimize the risks from identity spoofing in the following ways:
Protect the from address field in the MFP Digital Sending and Fax configurations.
Protect MFP disk access.
Configure authentication.
Configure the administrator password.
Configure SNMPv3.
Tampering with Data
Tampering with data can include any method of changing, destroying, or adding to information
that is flowing to or from an MFP or stored on it. Here are some ways tampering with data can
relate to MFPs:
Canceling another person's job. Someone could use a remote access tool to cancel
pending jobs. The person who sent a cancelled job gets no warning; only part or none of
the job is printed.
Intercepting a print job before it reaches the MFP, altering it, and sending it on to the MFP
Intercepting remote configuration data, such as communications between Web Jetadmin
and the MFP, to get passwords and other information
You can minimize the risks from data tampering in the following ways:
Disable Cancel Job button.
Disable Go (Pause) button.
Configure SNMPv3.
Prevent unnecessary remote access: close down all unused ports and protocols.
Configure HTTPS for EWS access.
Repudiation
Repudiation is using an MFP without leaving usage information. This includes preventing the MFP
from logging data or bypassing security checks such as user authentication. This also includes
finding ways to use an MFP without paying by bypassing job accounting software. Here are some
ways repudiation can relate to MFPs:
Accessing usage logs to delete entries
Removing origination information from file metadata
Bypassing user authentication
Using remote management software to access the MFP
You can minimize the risks of repudiation in the following ways: