Quality & Acceptance

Chapter 10 — Core Switch Security Hardening Design Guide


Quality assurance and formal acceptance testing are the final gates that verify a core switch security hardening deployment meets its design objectives before the device is placed into production service. The acceptance process is structured in three phases: pre-deployment verification (hardware and software checks before installation), post-deployment functional testing (verifying that all hardening controls are active and correctly configured), and ongoing quality monitoring (continuous verification that hardening controls remain effective over time). A hardening deployment that passes all acceptance criteria provides documented evidence that the security posture meets the organization's requirements and applicable compliance frameworks.

10.1 Quality Comparison: Before vs. After Hardening

The quality comparison image below illustrates the measurable difference between an unhardened core switch deployment and a fully hardened deployment. The left side represents a typical pre-hardening state characterized by disorganized cable management, red alert indicators, security vulnerabilities, and lack of physical access controls. The right side shows the same environment after systematic hardening: organized color-coded cabling, green status indicators, port blockers on all unused ports, tamper-evident seals, and documented quality metrics demonstrating 99.999% uptime, an A+ security score, 70% reduction in mean time to recovery, and zero unauthorized access events.

Quality Comparison: Before vs. After Core Switch Security Hardening
Figure 10.1: Quality Comparison — Before Hardening (left: disorganized, red alerts, security risks) vs. After Hardening (right: organized, green status, port blockers, tamper seals, 99.999% uptime, A+ security score)

10.2 Pre-Deployment Verification Checklist

Pre-deployment verification must be completed before the switch is physically installed in the production rack. This phase covers hardware integrity verification, software version validation, and baseline configuration review. All items must be checked and signed off by the deployment engineer and reviewed by the security team lead.

#Verification ItemMethodPass CriteriaResponsible
1Hardware serial number verificationPhysical inspection; compare to purchase orderSerial number matches PO; no physical damageDeployment Engineer
2Software version verificationBoot to CLI; show versionApproved software version per change recordDeployment Engineer
3Software image integrity checkVerify MD5/SHA hash against vendor published hashHash matches vendor published valueSecurity Team
4Baseline hardening configuration loadedCompare running config to approved baseline templateAll required hardening controls present; no deviationsSecurity Team
5No default credentials presentAttempt login with known default credentialsAll default credentials changed; login failsSecurity Team
6Telnet and HTTP disabledAttempt Telnet and HTTP connectionConnection refused; only SSH and HTTPS acceptedDeployment Engineer
7Unused services disabledReview running config; check service statusAll services not required by design are disabledSecurity Team
8AAA server connectivity verifiedTest authentication against primary and secondary AAAAuthentication succeeds via both serversDeployment Engineer
9NTP synchronization verifiedCheck NTP status; verify time accuracyNTP synchronized; time accurate to ±1 secondDeployment Engineer
10Syslog connectivity verifiedGenerate test log event; verify receipt at SIEMTest event received at SIEM within 30 secondsSecurity Team

10.3 Post-Deployment Security Control Acceptance Tests

Post-deployment acceptance tests verify that each security hardening control is functioning correctly in the production environment. These tests must be performed after the switch is installed and connected, but before traffic is migrated to the new switch. Each test must be documented with the actual result and compared against the pass criteria.

Test IDControl TestedTest ProcedurePass CriteriaResult
AT-01SSH access control (allowlist)Attempt SSH from authorized IP; attempt from unauthorized IPAuthorized IP: login prompt; Unauthorized IP: connection refused[ ] Pass / [ ] Fail
AT-02AAA authenticationLogin with valid TACACS+ credentials; login with invalid credentialsValid: login succeeds; Invalid: login fails after 3 attempts; lockout applied[ ] Pass / [ ] Fail
AT-03Command authorizationAttempt privileged commands with read-only accountPrivileged commands denied; authorization failure logged to SIEM[ ] Pass / [ ] Fail
AT-04CoPP rate limitingGenerate high-rate ICMP flood toward switch management IPCoPP drops excess ICMP; switch CPU remains below 50%; forwarding unaffected[ ] Pass / [ ] Fail
AT-05BGP authenticationAttempt BGP session without MD5/SHA key; with incorrect keyBGP session without key: rejected; incorrect key: rejected; correct key: session established[ ] Pass / [ ] Fail
AT-06OSPF authenticationAttempt OSPF adjacency without authentication keyUnauthenticated OSPF adjacency rejected; authenticated adjacency established[ ] Pass / [ ] Fail
AT-07BPDU GuardConnect unauthorized switch to access port; send BPDUPort enters err-disabled state within 1 second; alert sent to SIEM[ ] Pass / [ ] Fail
AT-08DHCP SnoopingConnect rogue DHCP server to untrusted portDHCP offers from untrusted port dropped; legitimate DHCP from trusted port passes[ ] Pass / [ ] Fail
AT-09Configuration change loggingMake a test configuration change; verify loggingChange logged to SIEM with timestamp, username, and command detail within 60 seconds[ ] Pass / [ ] Fail
AT-10HA failover security continuityInitiate supervisor failover; verify security controls post-failoverFailover completes in <30 seconds; all ACLs, CoPP, and routing auth remain active[ ] Pass / [ ] Fail

10.4 Acceptance Scoring and Sign-Off Criteria

The acceptance scoring framework defines the minimum pass threshold for each test category and the overall deployment acceptance decision. A deployment that fails any critical test must be remediated before it can be accepted into production service. The sign-off process requires approval from both the deployment engineer and the security team lead, with documentation retained for audit purposes.

Test CategoryTestsMinimum Pass RateFailure Action
Pre-Deployment Verification10 items100% — all items must passHalt deployment; remediate before proceeding
Management Plane ControlsAT-01, AT-02, AT-03100% — all must passHalt deployment; management plane must be secure
Control Plane ControlsAT-04, AT-05, AT-06100% — all must passHalt deployment; control plane must be secure
Data Plane / L2 ControlsAT-07, AT-08100% — all must passHalt deployment; L2 security must be active
Logging and HA ControlsAT-09, AT-10100% — all must passHalt deployment; logging and HA security must be verified
Overall Acceptance DecisionAll 20 items100% pass rate requiredAny failure: deployment rejected; remediation required