I'm beginning to create benchmarks for device/OS configurations based on the Center for Information Security's (CIS) benchmarks. They currently don't have any benchmarks for Meraki. I haven't found any documentation about best practices for secure Meraki configurations. Does anyone have any resources they could point me to for more information on the topic?
... View more