Symphony BF Appendix
1.4/0222 19
Appendix
IT security
As a provider of security-specific solutions, Commend has a tradition of passionate commitment to se-
curity, both physical and digital. We are acutely aware of what is at stake, as users depend – and in
extreme cases even stake their lives – on the reliability of our systems. Where digital security is con-
cerned, we make every effort to ensure cyber security best practices in the design, production and rig-
orous testing of every component to rule out exploitable vulnerabilities as much as possible.
The following sections will guide you through cyber security related configuration steps.
Password management
Using a secure and unique password is the most fundamental means of providing basic protection
against unauthorised access. For this reason, it is essential to change the default password for any de-
vice in the Intercom system. Make sure you are using a strong password according to your internal IT
security regulations. For a password to be as secure as possible, the following applies: length over
complexity.
A password must:
consist of a minimum of 12 characters (max. 64 characters)
include the following allowed characters: [SPACE] _ a b c d e f g h i j k l m n o p q r s t u v w x y z A
B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9 ^ $ ? . * + -& [ { ( ) } ] | \ / ! # % :
; , = @ ~
include a mix of numbers, symbols (if applicable), uppercase and lowercase letters
not include user names or dictionary words
only be used once to prevent access to other devices
Another way to ensure a maximum of security is to change and renew the password regularly. This is
especially important for user passwords that are used on a daily basis. Furthermore, it is recommend-
ed to use a password manager software to securely store passwords.
For configuration details, follow the links below.
Password-protected access
Change basic user account data for the web interface, see ”User Management” on page 13
User account for the SIP server, see ”SIP Settings” on page 10
Prevention from brute-force attack by locking the login to the web interface for 180 seconds after the
third failed attempt with invalid login data