Lexmark XC4342 Security White Paper - Page 2

Contents, Secure Remote Management

Page 2 highlights

Contents 2 Contents Executive Overview 5 Executive Overview...5 Zero Trust...6 Zero Trust...6 Lexmark Secure Software Development Lifecycle (SSDL 7 Lexmark Secure Software Development Lifecycle (SSDL 7 Importance of firmware updates 9 Importance of firmware updates...9 Lexmark Secure by Default 11 Lexmark Secure by Default...11 Secure Remote Management 13 Device and Settings Access...13 Audit Logging...14 Digitally Signed Firmware Updates...15 Certificate Management...16 HTTPS...17 SNMPv3...18 Secure Password Reset...18 Secure Network Interfaces 20 TCP Connection Filtering...20 Port Filtering...21 802.1X...22 IPsec...23 Secure Network Time Protocol...24 Fax and Network Separation...24 Secure Access 27 Authentication and Authorization...27 Access controls...28 Active Directory...29

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64

Contents
Executive Overview
......................................................................................
5
Executive Overview
.............................................................................................................................................
5
Zero Trust
.......................................................................................................
6
Zero Trust
...............................................................................................................................................................
6
Lexmark Secure Software Development Lifecycle (SSDL)
.....................
7
Lexmark Secure Software Development Lifecycle (SSDL)
.......................................................................
7
Importance of firmware updates
................................................................
9
Importance of firmware updates
......................................................................................................................
9
Lexmark Secure by Default
.........................................................................
11
Lexmark Secure by Default
...............................................................................................................................
11
Secure Remote Management
....................................................................
13
Device and Settings Access
............................................................................................................................
13
Audit Logging
......................................................................................................................................................
14
Digitally Signed Firmware Updates
...............................................................................................................
15
Certificate Management
...................................................................................................................................
16
HTTPS
....................................................................................................................................................................
17
SNMPv3
................................................................................................................................................................
18
Secure Password Reset
....................................................................................................................................
18
Secure Network Interfaces
........................................................................
20
TCP Connection Filtering
................................................................................................................................
20
Port Filtering
........................................................................................................................................................
21
802.1X
...................................................................................................................................................................
22
IPsec
......................................................................................................................................................................
23
Secure Network Time Protocol
......................................................................................................................
24
Fax and Network Separation
..........................................................................................................................
24
Secure Access
.............................................................................................
27
Authentication and Authorization
..................................................................................................................
27
Access controls
..................................................................................................................................................
28
Active Directory
.................................................................................................................................................
29
Contents
2