4.1. Background
Today, mobile phone, cable TV operators and Internet service providers have the tendency to disappear as independent/individual service providers. The market tendency is to provide all services in a single service to prime clients. Major market players are consolidating their services by expanding already existing areas, by creating new areas from ground up or by acquisition of already existing companies that bring technology and businesses from their area.
Due to non-disclosure agreement, organization, methodologies and technologies used cannot be mentioned.
4.2. Business Scope
It is in the business scenario of consolidation that a security outsourcing project was executed for a major Telco. The objectives were to implement, optimize and monitor the implementation of the …show more content…
In a Telco, networking equipment related with voice and Internet Service was treated with special security measures. Only minimum essential data was disclosed to the security team at this point.
4.7. Risks Identified
In a Telco environment network equipment is the core infrastructure and due to the specific functions performed in this context their origin is from different manufacturers, with proprietary technologies in most cases, and are configured and operated only by specialized technicians from the maker. Although current operations are done by organization’s staff, specialised support is done by suppliers’ specialists.
The most relevant risks identified are related with access records. The ISO 27001 Standard recommends that all accesses and record changes should be logged.
These are the most representative