Atlassian uses cookies to improve your browsing experience, perform analytics and research, and conduct advertising. Accept all cookies to indicate that you agree to our use of cookies on your device. Atlassian cookies and tracking notice, (opens new window)
/
Handheld Hardening Checklists

    Handheld Hardening Checklists

    Nov 06, 2013

    The hardening checklists are based on the comprehensive checklists produced by The Center for Internet Security (CIS), when possible. The Information Security Office has distilled the CIS lists down to the most critical steps for your systems, with a particular focus on configuration issues that are unique to the computing environment at The University of Texas at Austin.

    How to use the checklists

    Print the checklist and check off each item you complete to ensure that you cover the critical steps for securing your server. The Information Security Office uses this checklist during risk assessments as part of the process to verify that servers are secure.

    How to read the checklists

    Step - The step number in the procedure. If there is a UT Note for this step, the note number corresponds to the step number.
    Check (√) - This is for administrators to check off when she/he completes this portion.
    To Do - Basic instructions on what to do to harden the respective system
    CIS - Reference number in the The Center for Internet Security (CIS) benchmarks. The CIS documents outline in much greater detail how to complete each step.
    UT Note - The notes at the bottom of the pages provide additional detail about the step for the university computing environment.
    Cat I - For systems that include category I data, required steps are denoted with the ! symbol. All steps are recommended.
    Cat II/III - For systems that include category II or III data, all steps are recommended, and some are required (denoted by the !).

    Checklists

    Handheld device operating systems

    Apple iOS Hardening Checklist

     

    Google Android Hardening Checklist





    Copyright © 2001-2013 Information Technology Services. All rights reserved.

    , multiple selections available,

    Confluence Documentation | Web Privacy Policy | Web Accessibility

    University Wiki Service

    ISO - Information Security Office
    • https://cloud.wikis.utexas.edu/wiki/spaces/ISO/pages/42017586/ISO+Team+Documentation+restricted
      https://cloud.wikis.utexas.edu/wiki/spaces/ISO/pages/42017586/ISO+Team+Documentation+restricted
       This trigger is hidden
    Results will update as you type.
    • 2FA options for gateway access services
    • 2FA options for remote access
    • 2FA options for web applications
    • A
    • Approved Encryption Methods for Handhelds
    • Approved Encryption Methods for Laptops and Desktops
    • Approved Encryption Methods for Removable Media
    • B
    • Frequently Asked Questions
    • Handheld Hardening Checklists
      • Apple iOS Hardening Checklist
      • Google Android Hardening Checklist
    • Hidden Costs of Cloud Services
    • InCommon Digital Server Certificates
    • Information Security Office
    • ISO Decision Matrix :: Cloud Services
    • ISO Decision Matrix :: Cloud Services [Draft]
    • ISO Incident Management Procedures
    • Multifunction Device Hardening Checklist
    • Operating System Hardening Checklists
    • Personally Identifiable Data Breach Notification Plan
    • Policies Governing the use of Cloud Services
    • Product requirements
    • Risks of Cloud Services
      Calendars

    You‘re viewing this with anonymous access, so some content might be blocked.
    {"serverDuration": 12, "requestCorrelationId": "441627e473ee4f13aca5ae016e01e58e"}