From Voice Video Policy Security Technical Implementation Guide
Part of SRG-POL-300611
Associated with: CCI-003072
The information security architecture at the individual information system level must be consistent with and complement the more global, organization-wide information security architecture that is integral to and developed as part of the enterprise architecture. The information security architecture includes an architectural description, the placement/allocation of security functionality (including security controls), security-related information for external interfaces, information being exchanged across the interfaces, and the protection mechanisms associated with each interface.
Review the site documentation to confirm the Voice Video system servers are dedicated to Voice Video applications or management. Confirm the servers and devices supporting the Voice Video and Unified Messaging core infrastructure do not run applications or provide management, other than what is minimally required. This includes the session manager, session border controllers, gateways, TDM telephone switches, voicemail, Unified Messaging servers, management servers, conference bridges, and other direct support servers. General-purpose applications such as browsers, word processors, etc., or other applications such as development software or special purpose applications should not be found unless directly required for operations and support. Additionally, unnecessary portions of the operating system such as sub-applications or files and routines that are not required to support the telephony system should not be found. If the Voice Video system servers are not dedicated to Voice Video applications or management, this is a finding.
Implement Voice Video system servers to be dedicated to Voice Video applications or management. Dedicate critical servers in the Voice Video and Unified Messaging core infrastructure to only run applications required for executing the primary function of the server/device and those required for its support. Additionally, remove all unnecessary portions of the operating system such as sub-applications or files and routines that are not required to support the telephony system.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer