If you were wondering how to protect your Asterisk against network attacks, for example brute force, the fail2ban application is...
If you want to be sure that there are no gaps in the company network through which documents will leak...
Running Asterisk as non-root user will prevent CLI commands that execute Linux scripts from being executed without the necessary privileges....
Preventing anyone from seeing your passwords in the Asterisk CLI and only using it once (while creating the endpoint) seems...