Avaya

Modular Messaging Help

 Getting Started 
 Administration 
 Maintenance 
 Reference 
Home > Getting started > Modular Messaging and Security > Physical security

Physical security

Ensuring the physical security of all the hardware components must be an important consideration in securing your Modular Messaging system.

General recommendations

  • You should always limit access to the system console and to the supporting documentation.

  • Provide good physical security for the room that contains the telecommunications equipment, administrative tools, records, system programming, and other vital information. Make sensitive areas physically secure during unattended times using methods such as locked doors or automatic detection devices.

  • Establish and maintain a clear physical perimeter.

  • Ensure that you restrict access to server rooms and lock these rooms when not attended. Access to work areas should be strictly limited to authorized personnel only.

  • Keep the attendant console and supporting documentation in a place that is secured with a changeable combination lock. Provide the combination to only those individuals have a real need to access the premises.

  • Keep telephone wiring closets and equipment rooms locked.

  • Keep telephone logs and printed reports in locations that only authorized personnel can access.

  • Design distributed reports so that they do not reveal password or trunk access code information.

  • Provide secure trash disposal for all sensitive information, including telephone directories, call accounting records, or anything that may supply information about your communications system. Such trash should be shredded.

  • Schedule regular backups for your Modular Messaging servers. This will ensure timely recovery when recovery is required. See the Installation Guide (pdf) for more information.

  • Ensure that you have taken adequate safety precautions for other hazards, such as fire or electrical malfunctions. See the Installation Guide (pdf) for more information.

Backups

Unfortunately, backups are frequently not included when security lists are made. Even at large organizations the importance of testing backups is sometimes neglected. A backup plan is necessary to ensure that essential, electronically stored business data can be recovered in the event of a system failure or disaster. Ensure that you develop and implement proper backup procedures for the system. Also create a data backup of all those machines that should be backed up such as a desktop system with valuable data. Backups must cover more than a few days so that older versions of files can be recovered and so that there is a reasonable chance of recovering from problems, especially intruder-caused damage that goes undetected for a significant time.

Without good backups, hardware failures might cause irretrievable data loss, and recovering from an intrusion might be difficult. Back up system files regularly to ensure a timely recovery should it be required. Schedule regular, off-site backups, periodically tested, with reasonable media rotation and offsite storage. See MAS backup and restore and Backup and restore for more information on backup procedures for the MAS and the MSS.

Top of page