S 2.377 Secure withdrawal from operation of VoIP components

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator

If VoIP components, for example end devices or middleware, are to be replaced or taken out of operation, then all security-related information must be deleted from the devices. This not only applies when devices are sent to the manufacturer, a service company, a waste disposal company, or some other third party; the corresponding safeguards must also be taken when scrapping, moving, or transferring the component to another user. This applies especially to the repair, maintenance, and replacement of a device under warranty in addition to the permanent withdrawal of the devices from operation.

In many cases, it is necessary to clarify which safeguards for deleting security-related information are compatible with the conditions of the contract and guarantee beforehand with manufacturers, dealers, or service providers. It is often possible to specify appropriate procedures together with the corresponding company.

Depending on the application scenario of the components, the following information may be stored on the devices, for example:

Due to the protection requirements of this information, it must be ensured that the data is deleted or made unreadable before taking defective or outdated devices out of operation or replacing them. After deleting the data, it must be checked if the deletion was executed successfully. The procedure to follow in this case depends greatly on the type and application scenario of the device.

For "normal" computers that were used as VoIP components, the hard disks should be deleted with a suitable tool so that it is impossible to restore the files after deletion. This can be accomplished, for example, by booting the computer from an external boot medium and overwriting the hard disks with random data. It is recommended in this case to repeat the overwriting process several times.

For appliances, the procedure used depends on whether a hard disk is installed in the device or if the data is stored on a non-volatile storage medium. The devices often provide a "factory reset" option that can be used to reset all configuration settings to the values set at the factory before delivery. It should still be checked if the data has actually been deleted or reset and if certain data or files are still present after performing a "factory reset".

In addition to checking the information stored on the device itself, the backup media should also be checked to determine if they contain sensitive information. If it is not necessary for some other reason to store the backup media (for example for archiving purposes or mandatory storage due to legal regulations), the media should also be erased after taking the device out of operation.

The components often have labels containing names on shortcut keys, IP addresses, telephone numbers, or other technical information. These labels should also be removed before disposal.

Review questions: