Secure defaults checklist
Topic: Security basics
Summary
Use this checklist when deploying a new system or reviewing an existing one: strong auth, least privilege, encryption, logging, and no unnecessary exposure. Covers auth, secrets, permissions, network, and backup security in one pass.
Intent: Checklist
Quick answer
- Auth: MFA for admin and sensitive access; keys or tokens for automation (no passwords in scripts). No default or shared passwords; revoke access when people leave.
- Secrets and encryption: no secrets in code or config in repo; use a vault or env. TLS for all sensitive traffic; encrypt data at rest; keys in KMS or vault, not with data.
- Least privilege and logging: minimum permissions per role; deny by default. Log auth and admin actions; centralize and protect logs; alert on failures and privilege changes.
Prerequisites
Steps
-
Authentication and access
MFA for admin and sensitive systems; keys or tokens for machines. No default credentials; revoke on offboard. Check that every account has a purpose and the minimum access needed.
-
Secrets and encryption
No secrets in git or plain config; use vault or env. TLS for HTTP, API, DB; encrypt data at rest. Keys in KMS or vault; backup encryption and key separation.
-
Permissions and network
Least privilege per role; deny by default. Firewall or network policy: only required ports and services exposed; no unnecessary admin exposure to the internet.
-
Logging and response
Log auth (success and failure) and admin actions; centralize and protect logs; retain per policy. Alert on high-risk events; document and test incident response and revocation.
Summary
Checklist for secure defaults: strong auth and MFA, secrets in vault and encryption in place, least privilege and minimal exposure, logging and alerting with a response plan. Use this for new deployments and periodic review.
Prerequisites
- What is authentication.
- Least privilege explained.
- Encryption at rest vs in transit.
- Logging for security.
Steps
Step 1: Authentication and access
MFA for admin; keys/tokens for automation. No default creds; revoke on offboard. Verify minimum access per account.
Step 2: Secrets and encryption
No secrets in repo; use vault or env. TLS and at-rest encryption; keys in KMS/vault.
Step 3: Permissions and network
Least privilege; deny by default. Expose only required ports and services.
Step 4: Logging and response
Log auth and admin; centralize and protect; retain and alert. Document and test incident response and revocation.
Verification
All items on the checklist are confirmed for the system; gaps are documented and remediated.
Troubleshooting
Legacy system without MFA — Add MFA to the IdP or gateway; plan migration. Secrets in config — Move to vault; rotate and remove from config.