||Protect Network/Management Infrastructure from Unexpected File System Changes: Service Providers and Network Operators should deploy tools to detect unexpected changes to file systems on Network Elements and Management Infrastructure systems where feasible and establish procedures for reacting to changes. Use techniques such as cryptographic hashes.
||Service Provider; Network Operator
||Cyber Security;Intrusion Detection;Network Design;Network Operations;Security Systems;
||www.cert.org/security-improvement/practices/p072.html, www.cert.org/security-improvement/practices/p096.html; Dependency on NRIC BP 8548. Related to BP 8103.