Introduction
A31003-D3000-P100-01-76A9, 10-2013
6 OpenStage and Desk Phone IP SIP V3, Security Checklist, Planning Guide
Security Strategy for Unify Products
– During installation/setup of the solution
– During operation
• During installation and during major enhancements or software
upgrade activities:
The Customer specific Product Security Checklists are used by a technician
to apply and/or control the security settings of every individual product.
Figure: Usage of Security Checklists (SCL)
Update and Feedback
• By their nature, security-relevant topics are prone to continuous changes and
updates. New findings, corrections and enhancements of this checklist are
being included as soon as possible.
Therefore, we recommend using always the latest version of the Security
Checklists of the products that are part of your solution.
They can be retrieved from the Unify partner portal http://www.unify.com/us/
partners/partner-portal.aspx for the entire product .
• We encourage you to provide feedback in any cases of unclarity, or problems
with the application of this checklist.
Please contact the Openscape Baseline Security Office (obso@unify.com).
Related Topics
1.3 Security Strategy for Unify Products
Reliability and security is a key requirement for all products, services and
solutions delivered by Unify. This requirement is supported by a comprehensive
security software development lifecycle that applies to all new products or product
versions being developed from design phase until end of life of the product.
Comments to this Manuals