The CDR Resource Adaptor provides SLEE services the ability to generate Call Detail Record (CDR) files. Download the CDR Resource Adaptor Security Notices
For interface management with CDR Resource Adaptor, follow these guidelines: We recommend that you adhere to principles of Zero Trust while designing, commissioning, and modifying your deployment.
Zero Trust includes authenticating and authorizing traffic whenever possible,
giving the least amount of access required to sessions and entities, and assuming that a security breach could originate from anywhere.
A Zero Trust security model helps mitigate the effect of a breach if a device or network is compromised.
For more information on Zero Trust principles, see Zero Trust Model - Modern Security Architecture | Microsoft Security. You can use the You will also need to use the security permission specification in the resource adaptor descriptor to
control relevant file permissions. You must establish trust domains around your devices and network
and configure security controls on the trust boundaries such as firewalls, network security groups, and rate limiting,
even when you control the devices on both sides of the boundary. We recommend that you replace certificates at least once per year, including removing the old certificates from your system.
This is known as rotating certificates.
You might need to rotate your certificates more frequently if they expire after less than one year, or if organizational policies require it. |
Product Documentation
Changelog Acknowledgements CDR Resource Adaptor Guide CDR Resource Adaptor Type API CDR Resource Adaptor MXBean API CDR Resource Adaptor File Tools API Documentation for other versions of CDR Resource Adaptor is also available. |