Instruction manual
General security measures
Issue 9 May 2003
4-9
Establishing a policy
As a safeguard against toll fraud, follow these guidelines:
■ Change passwords frequently (at least quarterly). Set password expiration
times and tell users when the changes go into effect. Changing passwords
routinely on a specific date (such as the first of the month) helps users to
remember to do so.
■ Establish well-controlled procedures for resetting passwords.
■ Limit the number of invalid attempts to access a voice mail to five or less.
■ Monitor access to the dial-up maintenance port. Change the access
password regularly and issue it only to authorized personnel. Consider
using the Remote Port Security Device. (Refer to Chapter 16
for additional
information.)
■ Create a PBX system management policy concerning employee turnover
and include these actions:
— Delete all unused voice mailboxes in the voice mail system.
— If an employee is terminated, immediately delete any voice
mailboxes belonging to that employee.
— If a terminated employee had remote access calling privileges and a
personal authorization code, remove the authorization code
immediately.
— If barrier codes and/or authorization codes were shared by the
terminated employee, these should be changed immediately. Notify
the remaining users as well.
— If the terminated employee had access to the system administration
interface, their login ID should be removed (G3V3 or later). Any
associated passwords should be changed immediately.
■ Back up system files regularly to ensure a timely recovery should it be
required. Schedule regular, off-site backups.
Physical security
You should always limit access to the system console and supporting
documentation. The following are some recommendations:
■ Keep the attendant console and supporting documentation in an office that
is secured with a changeable combination lock. Provide the combination
only to those individuals having a real need to enter the office.
■ Keep telephone wiring closets and equipment rooms locked.
■ Keep telephone logs and printed reports in locations that only authorized
personnel can enter.
■ Design distributed reports so they do not reveal password or trunk access
code information.