||Authentication databases/files used by Network Operators, Service Providers, Public Safety, and Equipment Suppliers must be protected from unauthorized access, and must be backed-up and securely stored in case they need to be restored.
||Cable; Internet/Data; Satellite; Wireless; Wireline
||Service Provider; Network Operator; Equipment Supplier
||Cyber Security;Encryption;Information Protection;Intrusion Detection;
|| Filter access to the TCP and/or UDP ports serving the database at the network border. Use strong authentication for those requiring access. Prevent users from viewing directory and file names that they are not authorized to access. Enforce a policy of least privilege. Build a backup system in the event of loss of the primary system. Document and test procedures for backup and restoral of the directory.