HomeBest PracticesPrinter Friendly Version

Best Practices

1. Network Security

1.1. Client Security

  • Must Have Practices

    • Should have endpoint protection installed on all managed devices

    • MDM and/or GPO should be used to manage policies that ensure a secure client

    • End users should backup their data

      • Network admins should provide a means to store the backup data

      • Training should be provided to end users

    • Patching should be completed for the OS and any installed 3rd party applications

  • Best Practices

    • Software Restriction Policies (Windows GPO)

    • Computer Configuration => Policies => Windows Settings => Security Settings =>Software Restriction Policies

    • No Local Admin rights for users

    • Use approved applications list through MDM for self-service software installations

    • Use drive encryption


1.2. End User Security

  • Must Have Practices

    • Provide appropriate training/documentation to protect against phishing, social engineering, etc.

    • Password management

      • Consider complexity, history, security

    • Policy and procedure for provisioning/deprovisioning of user accounts

  • Best Practices

    • Use of multi-factor authentication

    • Use a password manager

    • Auto provisioning/deprovisioning of user accounts


1.3. Server Security

  • Must Have Practices

    • Hardware should be in a secure location

      • Document who has access to servers

    • Secure access to network & power feeds to servers

    • Patching should be completed for the OS and any installed 3rd party applications

    • Change the default username for the Domain Administrator Account

  • Best Practices

    • Use a separate admin account to administer each server

    • Technology administrators should have a standard user account for day-to-day tasks and a privileged account for administrative functions

    • Use software that rotates passwords on a scheduled basis (Cyberark)

    • Use a password manager

    • Use of multi-factor authentication

    • Run automated tasks/services under a dedicated service account


1.4. Wiring Closets

  • Must Have Practices

    • Adequate power and cooling

      • Security and communication systems rely on network services

      • Use dedicated power circuits

      • UPS to handle brief power outage

    • Secure, locked location

  • Best Practices

    • Devoted to no other equipment other than network/server hardware

    • Card access with logging

    • Security cameras

    • Document cabling and label all equipment

    • UPS to handle extended power outage

    • Generator to provide backup power


1.5. Wireless

  • Must Have Practices

    • Must use at minimum WPA2/AES encryption on the SSID

    • Use of multiple SSIDs to segment traffic

      • Guest and production at a minimum

      • Each SSID should be segmented on separate vlans and use ACL (access control lists) to limit access between these network segments

  • Best Practices

    • Newer Security Methods

      • Use 802.1x authentication for clients

      • PPSK (Personal Pre Shared Key)

    • Separation of guest and production networks can also be done using a single SSID via  the wireless network vendor

    • Consider password rotations


1.6. Switches

  • Must Have Practices

    • Use SSH/SSL for management

    • Capabilities

      • VLAN segmentation

        • Splits network devices into containers/traffic lanes

      • Access Control Lists (ACL)

        • Allows/Blocks certain traffic from communicating with other traffic.

      • Network Access Control (NAC)

        • Checked devices to make sure they meet organizations security requirements (Has Antivirus, installed windows patches, etc)

      • Redundant power supplies

        • Security and voice services rely on network connectivity.

  • Best Practices

    • Set Console session timeouts

      • Prevent a rogue user from connecting to a device with elevated privileges

      • Technicians should ensure they log off each session, whether remote or direct.

    • Redundant core switches configured for failover

    • Ensure maintenance contract matches life expectancy of hardware

    • Ensure security updates will be available to match the life expectancy of the hardware.

    • Configure VLAN segmentation to split traffic and meet security objectives of organization.

    • Traffic prioritization

      • Allows voice, security, or other services as the organization identifies to have a higher network priority than other traffic including, but not limited to rouge or malicious traffic.

    • Auto provisioning of ports (VLAN segmentation and ACL)

      • Cameras, access points, servers, clients, guest devices


1.7. Filtering

  • Must Have Practices

    • Granular Policy enforcement (staff / student)

    • Filtering needs to meet CIPA requirements

    • Off site filtering of student devices

    • Selective SSL Decryption

    • Ability to create custom categories

    • Determine how unknown sites are handled

    • Determine how sites are categorized

      • Determine how site submissions handled

        • Human intervention

        • Machine Learning

  • Best Practices

    • Policy enforcement by directory service and IP address

    • Ability to exclude IP address from filtering

    • Off site filtering of all devices, student or staff.


1.8. Firewall

  • Next Gen Firewall

    • Must Have Practices

      • Application Control

      • Intrusion Prevention

      • SSL Decryption for all traffic flows/sessions

      • Zone definitions to include, Outside, Inside, DMZ

      • Secure VPN access controlled via policy

      • Ensure proper firewall sizing based on needs

      • Ensure logging/reporting retention fits districts needs

      • Allow for connectivity to the outside Internet aggregation switch at ESU3

        • Districts should not traverse the ESU3 Private LAN

    • Best Practices

      • Log Analysis and Notifications of important events.

      • Web Content Filtering

      • Anti-Virus

      • Ensure maintenance contract matches life expectancy of hardware

      • Life cycle of device

        • Future growth

        • Hardware end of life


1.9. IP Addressing

  • Must Have Practices

    • Private address space should be used for internal addressing

  • Best Practices

    • If public IP address is used, be sure it is behind a NAT firewall

    • Reasonable DHCP lease expiration


1.10. Backups

  • Must Have Practices

    • Systems deemed as critical should be backed up

      • This may included financial system, student systems, Active Directory, etc.

    • All backups should be securely stored at an offsite location

    • Be sure retention matches business objectives

    • Test your backups - cloud and local

    • Review cloud services DR plans

      • Don’t assume that cloud backups are safe

  • Best Practices

    • All servers should be backed up

    • Use volume shadow copy

    • Prioritize backup of systems based on how critical they are to your environment

      • Create backup retention schedules based on priority of systems

    • Encrypt backup data, both in transit and at rest

    • Air gap between backups and production data to protect against crypto attacks


1.11. 3rd Party Vendor Equipment

Example would include: HVAC, Lighting, IoT, Clocks

  • Must Have Practices

    • Don’t use default credentials

    • Document the equipment that is connected to the network

    • Secure protocols between devices and mgmt systems

  • Best Practices

    • Use vlan segmentation with ACLs to control access

    • Firmware updates for security vulnerabilities if available.


1.12. Security Risk Assessment \ Documentation

  • Must Have Practices

    • Self assessment of all risks related to technology

    • Develop and maintain a Disaster Recovery plan

    • Develop and maintain an Incident Response plan

    • Ensure logging/reporting retention fits districts needs

  • Best Practices

    • Contract with security consultant to assess all risks related to technology

    • Penetration testing

    • Review Disaster Recovery and Incident Response plan annually

    • Review policies related to security annually