The following is a typical security checklist that you can use to make sure your installation is secure: