The overall security of the Xarios Call Recorder deployment relies on the many installation factors, primarily the security in place on the host operating system and network infrastructure.
The following sections outline recommendations for improving security of Xarios Call Recorder installations.
Securing the installation and ensuring only relevant users have access to the system is the responsibility of the installer of the system. |
It is essential to secure access to both the host operating system and the Xarios Call Recorder website to ensure that only users that should be accessing the system, can access the system. In addition, any user accounts created on the system should use the 'principle of least privilege', using the Roles & Profiles provided to limit user access to only the features they require.
The system also has a number of 'Built-In' user accounts which provide a pre-determined level of access. These include:
The default passwords of these accounts should be changed after installation to restrict access to the system.
For more information on managing user accounts, please refer to the Users & Business Units section.
The Xarios Call Recorder Website provides users with access to the configuration settings for the system as well as being the front end for the call recording playback and reporting interface.
By default, access to this website is through HTTP on port 80. To improve security for users logging into the system, HTTPS should be enabled on the website and HTTP access should be disabled.
To enable HTTPS, a certificate must be uploaded to server and the IIS server (local web server) configuration must be updated. For information on how to do this, please refer to the Enabling HTTPS section.
It is important that the operating system hosting the Xarios Call Recorder has security policies in place to minimize the risk of any unauthorized access to data and/or features. The following security steps should be taken on ALL host operating systems as a bare minimum:
Following the steps above will make the system more secure and will reduce the risk of unauthorized access.
Access to weaker ciphers/protocols needs to be done in the operating system registry in most instances. Information on how to do this can be found in the following Microsoft articles:
Alternatively, the following free tool can be used - https://www.nartac.com/Products/IISCrypto
This is not an exhaustive list and should be taken as a bare minimum of security precautions that should be applied to the host operating system. |
To comply with local data protection laws (such as GDPR), it is important to understand what personal data is being stored within the solution and what it is being used for. There are several areas where personal data could be stored within the Xarios Call Recorder system:
In all cases where customer's or employee's personal data is stored in the system, the following guidelines should be followed:
For more information on GDPR, where data is stored within Xarios Call Recorder, please refer to the GDPR section.