Line 29: |
Line 29: |
| ==Secure Operation Guidelines== | | ==Secure Operation Guidelines== |
| | | |
− | * Regularly Update Firmware - Regularly check and apply firmware updates for security patches and improvements. | + | * '''Regularly Update Firmware''' - Regularly check and apply firmware updates for security patches and improvements. |
− | * Monitor Access Continuously - Continuously monitor access to administrative services and restrict as needed. Create and regularly review ”Events Reporting” rules to inform when certain events occur on the device. | + | * '''Monitor Access Continuously''' - Continuously monitor access to administrative services and restrict as needed. Create and regularly review ”Events Reporting” rules to inform when certain events occur on the device. |
− | * Update Passwords Periodically - Regularly update passwords and ensure they adhere to strong password policies. | + | * '''Update Passwords Periodically''' - Regularly update passwords and ensure they adhere to strong password policies. |
− | * Audit Protocols Regularly - Regularly audit the protocols used for configuration and management to ensure they remain secure. | + | * '''Audit Protocols Regularly''' - Regularly audit the protocols used for configuration and management to ensure they remain secure. |
− | * Review Firewall rules - Regularly audit and review firewall and traffic rules. | + | * '''Review Firewall rules''' - Regularly audit and review firewall and traffic rules. |
− | * Review used services - Regularly review the services that are being used on the device. Disable services that are not used. | + | * '''Review used services''' - Regularly review the services that are being used on the device. Disable services that are not used. |
− | * Configure Secure VPNs - Use secure VPN protocols (e.g., IPsec, OpenVPN, WireGuard) for remote access instead of exposing sensitive services directly. | + | * '''Configure Secure VPNs''' - Use secure VPN protocols (e.g., IPsec, OpenVPN, WireGuard) for remote access instead of exposing sensitive services directly. |
− | * Conduct WiFi Audits - Periodically review WiFi settings and ensure they comply with the latest security requirements. | + | * '''Conduct WiFi Audits''' - Periodically review WiFi settings and ensure they comply with the latest security requirements. |
− | * Review SIM Card Usage - Regularly review SMS and data usage limits and adjust them based on current needs and usage patterns. Disable SMS utilities entirely, if it is not utilized whatsoever. | + | * '''Review SIM Card Usage''' - Regularly review SMS and data usage limits and adjust them based on current needs and usage patterns. Disable SMS utilities entirely, if it is not utilized whatsoever. |
| | | |
| | | |