A security policy is a statement of rules for an organization. The policy rules state how people must handle organizational information and technology assets. The technological assets include hardware and software.
Security issues
change constantly. Security measures that you implement today might not be as secure tomorrow. One of the most important tools for securing a system is to have a published security policy that you enforce. A security policy in place is vital for an efficient and secure system. It protects the information assets of your organization. This security policy must include the following information:
-
Published security guidelines to inform
users of their responsibilities
-
Corporate policies to define network
access, service access, local and remote user authentication, dial-in
and dial-out, disk and data encryption, and virus protection measures
-
Employee training
Protect all potential points of network attack with the same level of network security. In addition, the security policy must clearly provide the following information:
-
Identify what is to be protected.
-
State what it needs to be protected against.
-
State the possibilities and occurrences of well-known threats.
-
Describe processes to implement measures that protect corporate
assets in a cost-effective manner.
-
Describe processes to review and improve the security
measures on a continuous basis.
-
Define corporate security goals.
-
Include rules about negative or irresponsible behavior, a path
for problem escalation, and information about whom to notify of
all security issues.
-
Define measures to ensure that no one circumvents the policy.
The security policy must be based on a carefully conducted security
analysis, risk assessment, and business needs analysis. For more information, use the Site Security Handbook memo (RFC2196) at www.ietf.org to help create a security policy. The Internet Engineering Task Force issues the handbook.
Topics in this section include:
General security guidelines
Security is more than preventing hackers from eavesdropping on
messages. Security also means protecting your system against fraudulent
long-distance charges, corporate espionage, and malicious system
intrusions. By recognizing the different types of hackers and the
trails they leave, you can protect your system, and possibly catch
the hackers. Prevention is your most effective weapon against voice
mail hackers. You can deter most voice mail hackers with common-sense policies and procedures. The policies and procedures address better system design and administration, subscriber education, and effective company voice mail policies and guidelines.
A well established security policy can enhance the
security of your system considerably. The following general guidelines
can help reduce unauthorized usage. Ensure that the security policy addresses the following:
-
Protects system administration access. Establish
multiple access levels for subscribers, system managers, and system
programmers. Require passwords for each level of access. Ensure
that secure passwords exist for all logins that allow system
administration or maintenance access to the system. Change the
passwords frequently.
-
Prevents voice mail system transfer to dial tone.
Activate secure transfer features in voice mail systems. Place
appropriate restrictions on voice mail access and egress ports.
-
Denies unauthorized users direct access into the system.
Manage your long-distance capabilities. Do not allow or restrict
calls to long-distance numbers through the voice mail system.
Do not allow access to outside lines through an automated attendant
or through an 800 number access to voice mail. Disable or deactivate the remote access features that you do not use. For each remote access feature that you use, require the use of barrier codes,
or authorization codes set for maximum length. Change the codes
frequently.
-
Blocks access to international calling capability.
When international access is required, establish permission
groups. Limit access to only the specific destinations required
for business.
-
Protects access to information stored as voice.
Use passwords to restrict access to voice mailboxes. Use nontrivial
passwords. Change passwords regularly.
-
Provides physical security for telecommunications
assets. Locate your voice mail system in a room with
controlled access. Restrict unauthorized access to equipment
rooms and wire connection closets. Protect system documentation
and reports data from being compromised.
-
Educates system users to recognize toll fraud activity
and to react appropriately. Toll fraud can occur when using calling cards and securing voice mailbox passwords. Train users on how to protect themselves from inadvertent compromises to the system security.
-
Reviews security with concerned personnel.
Review security measures regularly. Audit voice mail mailboxes
for reasonable passwords. Enforce a password change schedule. Do not allow preprogramming of passwords.
Educate and train users
Everyone who uses the system is responsible for the security of
the system. Users and attendants must know how to recognize
and react to potential hacker activity. Informed people are more
likely to cooperate with security measures that make the system
less flexible and perhaps more difficult to use. Renewed awareness in the form of a refresher course or an updated manual can
enhance the general security of the system.
In addition, ensure that the training addresses the following guidelines:
-
Never program passwords or authorization codes onto auto-dial
buttons. Display telephones reveal the programmed numbers, and internal
abusers can use the auto-dial buttons to originate unauthorized
calls.
-
Discourage the practice of writing down passwords. If a password needs to be written down, keep the password in a secure place, and never discard the password while it is active.
-
Establish well-controlled procedures for resetting passwords.
-
Limit the number of invalid attempts to access a subscriber mailbox to five or fewer.
-
Advise attendants to tell their system manager when they answer a series of telephone calls in which the caller is silent or hangs up.
-
Advise users who have voice mailboxes that they must change personal passwords frequently. Do not choose obvious passwords.
- Advise users with special telephone privileges of the potential risks and responsibilities. Special telephone privileges can include remote access, voice mail outbound calling, and call forwarding off-switch.
- Advise users that they must be suspicious of any caller who claims to be with the telephone company and wants to check an outside line. Users must ask for a callback number, hang up, and confirm the caller's identity.
- Never distribute the office telephone directory to people outside the company. Be careful when discarding it.
-
Never accept collect telephone calls.
-
Never discuss your telephone system numbering plan
with anyone outside the company.
-
Distribute voice mail security policies to all employees.
-
Ensure that operators and receptionists are security conscious and do not transfer callers to an outside line.
-
Establish procedures to prevent social engineering. Social engineering is a con game that hackers frequently use to obtain information that can help them gain access to your system.
Top of page
|