Chapter 11. Securing your Elastix System
In this section, we will discuss some topics regarding security in our Elastix Unified Communications System. We will share some recommendations to ensure our system's availability, privacy, and correct performance. Attackers' objectives may vary from damaging data, to data stealing, to telephonic fraud, to denial of service. This list is intended to minimize any type of attack, but remember that there are no definitive arguments about security; it is a constantly changing subject with new types of attacks, challenges, and opportunities.
The recipes covered in this chapter are as follows:
- Knowing the best practices when installing Elastix—Physical security
- Knowing the best practices when installing Elastix—Logical ...