19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Telecommunications Answering Machine<br />

_________________________________________________________________________________________<br />

Infrastructure:<br />

- S 1.23 (3) Locked doors (optional)<br />

- S 1.29 (3) Adequate siting of an <strong>IT</strong> system (optional)<br />

Organisation:<br />

- S 2.4 (3) Maintenance/repair regulations (optional)<br />

- S 2.11 (2) Provisions governing the use of passwords (security codes in this case)<br />

- S 2.54 (1) Procurement/selection of suitable answering machines<br />

- S 2.55 (1) Use of a security code (optional)<br />

- S 2.56 (1) Avoidance of confidential information on answering machines<br />

- S 2.57 (2) Regular playback and deletion of recorded messages<br />

- S 2.58 (3) Limitation of message time (optional)<br />

Personnel:<br />

- S 3.16 (2) Briefing personnel on the operation of answering machines<br />

Hardware & Software:<br />

- S 4.38 (1) Deactivation of unnecessary service features<br />

- S 4.39 (3) Deactivation of answering machines for periods of absence (optional)<br />

Contingency Planning:<br />

- S 6.40 (3) Regular battery checks/replacements (optional)<br />

_________________________________________________________________________________________<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Otober 2000<br />

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!