This checklist is a companion to Chapter 15, "Securing Your Network." Use it to help secure your network, or as a quick evaluation snapshot of the corresponding chapters.
This checklist should evolve as you discover steps that help implement your secure network.