SlideShare a Scribd company logo
1 of 3
Download to read offline
STATE OF ALABAMA

                         Information Technology Guideline

Guideline 660-02G7: Video Tele-Conferencing (VTC) Security

1.      INTRODUCTION:
Video Tele-Conferencing (VTC), or video conferencing, is an extension of traditional
telephony technologies, which provides aural communications with the additional features of
visual communications and information sharing.
While traditional telephone systems have few vulnerabilities and present minimal or no
security risk, this is not the case for Internet Protocol (IP) based or network connected VTC
endpoints. These VTC endpoints are riddled with security deficiencies and issues due to their
many useful features, connectivity options, and minimal built-in support for security controls.
There exists a natural conflict between making VTC systems work and making them secure.
Voice communications and video communications on an IP network use essentially the same
protocols, have the same IP vulnerabilities, and have the same security issues with firewalls.

2.     OBJECTIVE:
Provide guidance for securing IP-based VTC systems and communications.

3.       SCOPE:
These guidelines are recommended for all State of Alabama organizations that plan, manage,
or utilize VTC technology.

4.     GUIDELINES:
The following guidelines, based on the recommendations of the National Security Agency
(NSA) and other best practices, should be used to secure the VTC systems, communications,
and collateral information.
 •   Use the latest stable version of firmware and software; apply patches as required.
 •   Configure unique hard to guess remote access password and change passwords at least
     every 90 days. Do not use default accounts.
 •   Ensure passwords meet or exceed the requirements of State IT Standard 620-03S1.
 •   Ensure passwords are not displayed in the clear during logon.
 •   Configure unique hard to guess room password (physical access), and rotate
     periodically.
 •   Configure unique hard to guess SNMP community string, and rotate periodically.
     Ensure the default SNMP community strings (e.g., “public” and “private”) are changed
     prior to placing the system into service. Ensure SNMP community strings are managed
     like passwords.



Guideline 660-02G7: VTC Security                                               Page 1 of 3
•    Disable remote monitoring and web snapshots.
 •    Disable far-end camera control.
 •    Disable streaming capabilities.
 •    Disable all wireless functionality.
 •    Disable unnecessary features (FTP, HTTP, TELNET).
 •    Enable encryption for all calls (Set to auto at a minimum).
 •    Encrypt traffic between VTC units and management station.
 •    Disable auto-answer for incoming calls.
 •    Use ‘Do Not Disturb’ after all parties have connected and when no calls are expected.
 •    Ensure ringer volume is at an audible level.
 •    Use a security banner/welcome screen to advise users that they are accessing a
      Government information system and provide them with the appropriate privacy and
      security notices.
 •    Take a snapshot of all system files and periodically verify that they have not been
      modified.
 •    Use access control lists and firewall rules to secure VTC networks.
 •    VTC systems should be logically separated on the Local Area Network (LAN) from
      themselves and other LAN services. Separate VTC systems from the rest of the IP
      network using Virtual LANs.
 •    Physically secure VTC devices.
 •    Limit access to management server via strict access control lists.
 •    Utilize inactive session timeout feature to disconnect idle/inactive management
      connections or sessions. Set timer to a maximum of 15 minutes.
 •    Use HTTPS, SSH, or other secure service for device management.
 •    Turn off VTC device and cover camera lens when not in use.
 •    Conduct routine security audits of VTC devices.
 •    Do not publish network diagrams or VTC phonebooks.


5.     ADDITIONAL INFORMATION:
5.1    POLICY
Information Technology Policy 660-02: System Security
http://isd.alabama.gov/policy/Policy_660-02_System_Security.pdf




Guideline 660-02G7: VTC Security                                               Page 2 of 3
5.2        RELATED DOCUMENTS
Information Technology Dictionary
http://isd.alabama.gov/policy/IT_Dictionary.pdf

Information Technology Standard 620-03S1: Authentication-Passwords
http://isd.alabama.gov/policy/Standard_620-03S1_Authentication-Passwords.pdf


Signed by Art Bess, Assistant Director


6.         DOCUMENT HISTORY
Version     Release Date   Comments
Original      9/12/2008




Guideline 660-02G7: VTC Security                                         Page 3 of 3

More Related Content

What's hot

Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationNCS Computech Ltd.
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesGENIANS, INC.
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregationMagnus Jansson
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet GENIANS, INC.
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?Patten John
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomPositive Hack Days
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix FirewallSouvik Santra
 
Fortinet
FortinetFortinet
FortinetABEP123
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementationajeet singh
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsAnthony Daniel
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall PresentationManoj Kumar Mishra
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
001 introduction Fortigate Administration Introduction
001 introduction Fortigate Administration  Introduction001 introduction Fortigate Administration  Introduction
001 introduction Fortigate Administration IntroductionMohamed Sana
 

What's hot (20)

Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Secure your network - Segmentation and segregation
Secure your network - Segmentation and segregationSecure your network - Segmentation and segregation
Secure your network - Segmentation and segregation
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
firewall
firewallfirewall
firewall
 
Firewall Management: What Is It?
Firewall Management: What Is It?Firewall Management: What Is It?
Firewall Management: What Is It?
 
Dmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a TelecomDmitry Kurbatov. Five Nightmares for a Telecom
Dmitry Kurbatov. Five Nightmares for a Telecom
 
Internetworking With Pix Firewall
Internetworking With Pix FirewallInternetworking With Pix Firewall
Internetworking With Pix Firewall
 
Fortinet
FortinetFortinet
Fortinet
 
Firewall Design and Implementation
Firewall Design and ImplementationFirewall Design and Implementation
Firewall Design and Implementation
 
Firewalls Security – Features and Benefits
Firewalls Security – Features and BenefitsFirewalls Security – Features and Benefits
Firewalls Security – Features and Benefits
 
Cyberoam Firewall Presentation
Cyberoam Firewall PresentationCyberoam Firewall Presentation
Cyberoam Firewall Presentation
 
FortiWLC
FortiWLC FortiWLC
FortiWLC
 
Firewalls
FirewallsFirewalls
Firewalls
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
Forti wifi
Forti wifiForti wifi
Forti wifi
 
Fortigate class1
Fortigate class1Fortigate class1
Fortigate class1
 
Network Security
Network SecurityNetwork Security
Network Security
 
001 introduction Fortigate Administration Introduction
001 introduction Fortigate Administration  Introduction001 introduction Fortigate Administration  Introduction
001 introduction Fortigate Administration Introduction
 

Similar to VTC Security Guideline

Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Videoguy
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxikirkton
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxericbrooks84875
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmatCisco Canada
 
Secure collab on premise
Secure collab on premiseSecure collab on premise
Secure collab on premiseCisco Canada
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VRISC-V International
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxrock73
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architectureFeras Ajjawi
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdfJokaTek
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network ArchitecturesEnergySec
 

Similar to VTC Security Guideline (20)

Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...Systems and Network Analysis Center Information Assurance ...
Systems and Network Analysis Center Information Assurance ...
 
CompTIA Security Plus Overview
CompTIA Security Plus OverviewCompTIA Security Plus Overview
CompTIA Security Plus Overview
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Case study
Case studyCase study
Case study
 
Background Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docxBackground Information for World-Wide Trading CompanyWorld-Wide .docx
Background Information for World-Wide Trading CompanyWorld-Wide .docx
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session  CompTIA Security Plus Mini Bootcamp Session
CompTIA Security Plus Mini Bootcamp Session
 
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docxWWTC Office Layout Diagram.htmlBackground Information for Wo.docx
WWTC Office Layout Diagram.htmlBackground Information for Wo.docx
 
Secure collab on prem hikmat
Secure collab on prem   hikmatSecure collab on prem   hikmat
Secure collab on prem hikmat
 
Secure collab on premise
Secure collab on premiseSecure collab on premise
Secure collab on premise
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docxAuthentic Assessment Project (AAP) Jan 2017Background Informat.docx
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architecture
 
BRKIOT-2108.pdf
BRKIOT-2108.pdfBRKIOT-2108.pdf
BRKIOT-2108.pdf
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Unidirectional Network Architectures
Unidirectional Network ArchitecturesUnidirectional Network Architectures
Unidirectional Network Architectures
 

More from Videoguy

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingVideoguy
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresVideoguy
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingVideoguy
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksVideoguy
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streamingVideoguy
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideoguy
 
Video Streaming
Video StreamingVideo Streaming
Video StreamingVideoguy
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader AudienceVideoguy
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Videoguy
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGVideoguy
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingVideoguy
 
Application Brief
Application BriefApplication Brief
Application BriefVideoguy
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Videoguy
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second LifeVideoguy
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming SoftwareVideoguy
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoguy
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video FormatenVideoguy
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareVideoguy
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxVideoguy
 

More from Videoguy (20)

Energy-Aware Wireless Video Streaming
Energy-Aware Wireless Video StreamingEnergy-Aware Wireless Video Streaming
Energy-Aware Wireless Video Streaming
 
Microsoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_PresMicrosoft PowerPoint - WirelessCluster_Pres
Microsoft PowerPoint - WirelessCluster_Pres
 
Proxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video StreamingProxy Cache Management for Fine-Grained Scalable Video Streaming
Proxy Cache Management for Fine-Grained Scalable Video Streaming
 
Adobe
AdobeAdobe
Adobe
 
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer NetworksFree-riding Resilient Video Streaming in Peer-to-Peer Networks
Free-riding Resilient Video Streaming in Peer-to-Peer Networks
 
Instant video streaming
Instant video streamingInstant video streaming
Instant video streaming
 
Video Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A SurveyVideo Streaming over Bluetooth: A Survey
Video Streaming over Bluetooth: A Survey
 
Video Streaming
Video StreamingVideo Streaming
Video Streaming
 
Reaching a Broader Audience
Reaching a Broader AudienceReaching a Broader Audience
Reaching a Broader Audience
 
Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...Considerations for Creating Streamed Video Content over 3G ...
Considerations for Creating Streamed Video Content over 3G ...
 
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMINGADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
ADVANCES IN CHANNEL-ADAPTIVE VIDEO STREAMING
 
Impact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video StreamingImpact of FEC Overhead on Scalable Video Streaming
Impact of FEC Overhead on Scalable Video Streaming
 
Application Brief
Application BriefApplication Brief
Application Brief
 
Video Streaming Services – Stage 1
Video Streaming Services – Stage 1Video Streaming Services – Stage 1
Video Streaming Services – Stage 1
 
Streaming Video into Second Life
Streaming Video into Second LifeStreaming Video into Second Life
Streaming Video into Second Life
 
Flash Live Video Streaming Software
Flash Live Video Streaming SoftwareFlash Live Video Streaming Software
Flash Live Video Streaming Software
 
Videoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions CookbookVideoconference Streaming Solutions Cookbook
Videoconference Streaming Solutions Cookbook
 
Streaming Video Formaten
Streaming Video FormatenStreaming Video Formaten
Streaming Video Formaten
 
iPhone Live Video Streaming Software
iPhone Live Video Streaming SoftwareiPhone Live Video Streaming Software
iPhone Live Video Streaming Software
 
Glow: Video streaming training guide - Firefox
Glow: Video streaming training guide - FirefoxGlow: Video streaming training guide - Firefox
Glow: Video streaming training guide - Firefox
 

VTC Security Guideline

  • 1. STATE OF ALABAMA Information Technology Guideline Guideline 660-02G7: Video Tele-Conferencing (VTC) Security 1. INTRODUCTION: Video Tele-Conferencing (VTC), or video conferencing, is an extension of traditional telephony technologies, which provides aural communications with the additional features of visual communications and information sharing. While traditional telephone systems have few vulnerabilities and present minimal or no security risk, this is not the case for Internet Protocol (IP) based or network connected VTC endpoints. These VTC endpoints are riddled with security deficiencies and issues due to their many useful features, connectivity options, and minimal built-in support for security controls. There exists a natural conflict between making VTC systems work and making them secure. Voice communications and video communications on an IP network use essentially the same protocols, have the same IP vulnerabilities, and have the same security issues with firewalls. 2. OBJECTIVE: Provide guidance for securing IP-based VTC systems and communications. 3. SCOPE: These guidelines are recommended for all State of Alabama organizations that plan, manage, or utilize VTC technology. 4. GUIDELINES: The following guidelines, based on the recommendations of the National Security Agency (NSA) and other best practices, should be used to secure the VTC systems, communications, and collateral information. • Use the latest stable version of firmware and software; apply patches as required. • Configure unique hard to guess remote access password and change passwords at least every 90 days. Do not use default accounts. • Ensure passwords meet or exceed the requirements of State IT Standard 620-03S1. • Ensure passwords are not displayed in the clear during logon. • Configure unique hard to guess room password (physical access), and rotate periodically. • Configure unique hard to guess SNMP community string, and rotate periodically. Ensure the default SNMP community strings (e.g., “public” and “private”) are changed prior to placing the system into service. Ensure SNMP community strings are managed like passwords. Guideline 660-02G7: VTC Security Page 1 of 3
  • 2. Disable remote monitoring and web snapshots. • Disable far-end camera control. • Disable streaming capabilities. • Disable all wireless functionality. • Disable unnecessary features (FTP, HTTP, TELNET). • Enable encryption for all calls (Set to auto at a minimum). • Encrypt traffic between VTC units and management station. • Disable auto-answer for incoming calls. • Use ‘Do Not Disturb’ after all parties have connected and when no calls are expected. • Ensure ringer volume is at an audible level. • Use a security banner/welcome screen to advise users that they are accessing a Government information system and provide them with the appropriate privacy and security notices. • Take a snapshot of all system files and periodically verify that they have not been modified. • Use access control lists and firewall rules to secure VTC networks. • VTC systems should be logically separated on the Local Area Network (LAN) from themselves and other LAN services. Separate VTC systems from the rest of the IP network using Virtual LANs. • Physically secure VTC devices. • Limit access to management server via strict access control lists. • Utilize inactive session timeout feature to disconnect idle/inactive management connections or sessions. Set timer to a maximum of 15 minutes. • Use HTTPS, SSH, or other secure service for device management. • Turn off VTC device and cover camera lens when not in use. • Conduct routine security audits of VTC devices. • Do not publish network diagrams or VTC phonebooks. 5. ADDITIONAL INFORMATION: 5.1 POLICY Information Technology Policy 660-02: System Security http://isd.alabama.gov/policy/Policy_660-02_System_Security.pdf Guideline 660-02G7: VTC Security Page 2 of 3
  • 3. 5.2 RELATED DOCUMENTS Information Technology Dictionary http://isd.alabama.gov/policy/IT_Dictionary.pdf Information Technology Standard 620-03S1: Authentication-Passwords http://isd.alabama.gov/policy/Standard_620-03S1_Authentication-Passwords.pdf Signed by Art Bess, Assistant Director 6. DOCUMENT HISTORY Version Release Date Comments Original 9/12/2008 Guideline 660-02G7: VTC Security Page 3 of 3