Technical information

Product Security Checklists
16-8 Issue 7 June 2001
BasicWorks
Also see the general security checklist on page 16-2.
Customer: _________________________________________
System & Version: _________________________________________
Location: _________________________________________
New Install: _________________________________________
System Upgrade: _________________________________________
Major Addition: _________________________________________
Table 16-4. BasicWorks
Y/N
1
Note N/A
System Administration
Customer advised of all logins under their control.
Passwords changed from factory defaults.
Passwords are customer-entered, maximum length,
and unique alphanumeric words.
NETCON access restricted by COR-to-COR
restrictions
NETCON channels secured
Non-DID extensions used for NETCON ports
Unused NETCON channels removed
Login Security Violation Notification feature active
Logins automatically disabled after security
violation
Login Security Violations monitored 24 hours
per day
Login permissions customized
Unused logins removed (remove login command
or disabled [passwords VOIDed])
UNIQUE customer logins used
Continued on next page