New equipment and software might contain functionality capable of compromising cyber security. Some features which are desirable in one context might be highly undesirable in another and they may not be disclosed by equipment vendors without prompting. The purpose of this free checklist is to make those questions easier to ask (and to record the answers to facilitate record keeping and threat evaluation).

Please note: A full risk assessment should be conducted and the enabling of each function should be decided on a need versus risk basis. If functions are to be enabled, tests should be done to verify that following installation the appropriate functionality is switched off or on.

Some key aspects of this EEMUA Checklist are addressed further in EEMUA's Cyber Security e-learning.