Contents
Executive Overview
......................................................................................
5
Executive Overview
.............................................................................................................................................
5
Zero Trust
.......................................................................................................
6
Zero Trust
...............................................................................................................................................................
6
Lexmark Secure Software Development Lifecycle (SSDL)
.....................
7
Lexmark Secure Software Development Lifecycle (SSDL)
.......................................................................
7
Importance of firmware updates
................................................................
9
Importance of firmware updates
......................................................................................................................
9
Lexmark Secure by Default
.........................................................................
11
Lexmark Secure by Default
...............................................................................................................................
11
Secure Remote Management
....................................................................
13
Device and Settings Access
............................................................................................................................
13
Audit Logging
......................................................................................................................................................
14
Digitally Signed Firmware Updates
...............................................................................................................
15
Certificate Management
...................................................................................................................................
16
HTTPS
....................................................................................................................................................................
17
SNMPv3
................................................................................................................................................................
18
Secure Password Reset
....................................................................................................................................
18
Secure Network Interfaces
........................................................................
20
TCP Connection Filtering
................................................................................................................................
20
Port Filtering
........................................................................................................................................................
21
802.1X
...................................................................................................................................................................
22
IPsec
......................................................................................................................................................................
23
Secure Network Time Protocol
......................................................................................................................
24
Fax and Network Separation
..........................................................................................................................
24
Secure Access
.............................................................................................
27
Authentication and Authorization
..................................................................................................................
27
Access controls
..................................................................................................................................................
28
Active Directory
.................................................................................................................................................
29
Contents
2