Other Design Protections
Risk Assessment Plan
NICE CXone conducts risk assessments to identify:
-
Potential information security threats.
-
Risk exposure.
-
Mitigation steps that can be taken to reduce exposure.
Risk assessment results are documented and reviewed by the Risk Assessment Committee. Reviews may occur more often in response to significant changes in the:
-
System boundary.
-
Inventory.
-
Functionality.
-
Configuration.
-
Security posture.
Distributed Denial of Service Protection
NICE CXone protects against Distributed Denial of Service (dDoS) attacks. For NICE CXone internal networks, the first line of defense is the NICE CXone Network Operations Center (NOC). NOC administrators set up internal throttles and fencing. They also set up peering network connections to Level 3 (L3)/Century-Link for active dDoS protection. These connections are available if the attack is overwhelming. NICE CXone data is ingressed by the Border Gateway Protocol (BGP). In the case of a severe attack, the NOC directs BGP to send data to the L3 edge instead of the NICE CXone edge. L3 then scrubs the data and delivers it to the NICE CXone edge.
Within the public cloud, Amazon Shield protects the data.
Other protections include:
-
SIEM systems tied to network devices that look for attack items in logs.
-
Penetration testing.
-
Application APIs APIs allow you to automate certain functionality by connecting your CXone system with other software your organization uses. located behind load balancers and firewalls.