Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Step - The step number in the procedure. If there is a UT Note for this step, the note # corresponds to the step #.
Check (question) - This is for administrators to check off when she/he completes this portion.
To Do - Basic instructions on what to do to harden the respective system
MFD - Reference number in the Defense Information Systems Agency document entitled Multi-Function Device (MFD) and Printer Checklist for Sharing Peripherals Across the Network.
UT Note - The UT Note at the bottom of the page provides additional detail about the step for the university computing environment.
Cat I - For systems that include Category-I data, required steps are denoted with the ! symbol. All steps are recommended.
Cat II/III - For systems that include Category-II or -III data, all steps are recommended, and some are required (denoted by the *!*).
Min Std - This column links to the specific requirement for the university in the Minimum Security Standards for Systems document.

...

This list provides specific tasks related to the computing environment at The University of Texas at Austin.

1

Anchor
r1
r1
1

If other alternatives are unavailable, this can be accomplished by installing a SOHO router/firewall in between the network and the host to be protected. Performing as much of the configuration as possible while the MFD is not plugged into the network is another alternative.

Anchor
r2
r2
2

Some printers support non-IP based protocols for compatibility with legacy systems. These might include AppleTalk and IPX/SPX. These protocols are more difficult to monitor and secure, and should be disabled if they are not being used.

Anchor
r3
r3
3

Giving MFDs static IP addresses or DHCP reservations makes it easier to monitor them and apply access lists on hardware-based firewalls. Consider placing sensitive MFDs on their own VLAN, which may make them easier to identify and secure. It is also strongly advised to give MFDs campus-routed RFC 1918 addresses, so that they are not accessible from the Internet. It is rare that an MFD needs to be accessed from off-campus, and a VPN can be used in those instances.

Anchor
r5
r5
5

Examples of ways to provide secure communications:

  • If the MFD supports it, use HTTPS for web-based management rather than HTTP.
  • If you use SNMP to manage your MFD, and your MFD supports it, choose SNMPv3 for its authentication and encryption features.
  • Encryption of Category-I data that is output to a printer connected to a network shall be provided through the use of secure printing applications (e.g., JetDirect) or protocols (e.g., IPP over SSL or TLS) to prevent unauthorized network interception.
  • Rather than printing directly over the Internet, restrict printing to a select group of trusted campus subnets and use the VPN to print over the Internet.

Anchor
r8
r8
8

Examples of management protocols that can possibly be disabled:

  • HTTP/HTTPS: Most MFDs include an embedded web server, and HTTP or HTTPS will likely be the primary management protocol for your device. If the MFP does not require remote management, this interface can be disabled. At the very least, see if HTTPS is supported and HTTP can be disabled.
  • Telnet: Some MFDs provide telnet management interfaces, which are also used by some older management tools. If possible, disable this insecure protocol.
  • SNMP: If SNMP is not used for device management in your environment, then disable it.

Anchor
r10
r10
10

MFD upgrades are often manual processes. Patch update notifications might include e-mails from the manufacturer or leasing company.

Anchor
r12
r12
12

Examples of possible protocols:

  • Port 9100 (a.k.a. HP JetDirect, socket): Most printing services use this protocol, especially drivers from HP, so you may not be able to disable it.
  • LPD: LPD is used for printing by many Unix and Linux systems. However, many can now also use CUPS (the Common UNIX Printing System), which allows for printing via a number of protocols. If you do not need LPD, disable it.
  • IPP: If the Internet Printing Protocol is not used in your environment, then disable it.
  • FTP: Some printers give you the ability to FTP upload documents to print. This feature is not used in most environments and should be disabled.
  • SMB: SMB (Windows) printing is often not required, as it is taken care of by other protocols, such as JetDirect. It is also not encrypted. If possible, disable SMB printing.
  • SMTP: This is often used for scanning and faxing, and can often be disabled.

Anchor
r13
r13
13

Some MFDs may include the ability to securely erase job-related files in between jobs. Others might require an optional security kit from the manufacturer.

Anchor
r14
r14
14

Some ways to provide secure storage on MFDs:

  • User "mailboxes" (which usually contain faxes and scans) must require authentication and authorization.
  • Some MFDs support encrypted storage, either natively or with the addition of a security kit. If this option is available, consider using it.

Anchor
r18
r18
18

The level of confidentiality required dictates how MFDs are physically placed. Examples might include:

  • Kept in a data center with restricted access.
  • Kept in an office that is attended during business hours and locked after hours.
  • When a vendor is working on the MFD, the vendor's work is monitored to ensure that security measures are not removed during the course of troubleshooting. If they are removed, they must be put back in place.
    Refer to the UT Austin Minimum Security Standards for Data Stewardship for more information.

Anchor
r19
r19
19

If the MFD has a removable hard drive option, then ensure that the drive is locked into the device.

References

Anchor
_GoBack
_GoBack