UC Security Best Practices. September 25, 2008

Size: px
Start display at page:

Download "UC Security Best Practices. September 25, 2008"

Transcription

1 UC Security Best Practices September 25, 2008

2 Abstract Unified Communications (UC) offers the promise of facilitating an enterprise s drive for business agility through the deployment of a cost effective communications and collaboration platform spanning its remotely located and mobile employees, its supply chain, its partner ecosystem and its customers. Using a non technical approach, we take the Business Decision Maker (BDM) through best practices for securing multimedia UC. The key to securing the UC solution requires considering voice, data, and video communications as a system, and implementing a multilayered, uniformly applied defense construct for the system infrastructure, call management, applications, and endpoints. The solution should be layered, with multiple controls and protections at multiple network levels. This defense in depth approach minimizes the possibility that a single point of failure could compromise overall security. If a primary security layer is breached other defensive barriers are available to deter the attack. Such an approach has been considered best practice for data security since the first days of the Internet. The bottom line is that confidentiality, integrity, and availability of critical multimedia resources must be ensured while maintaining the UC solution s performance. Security features should be transparent to the user, standards based, simple to administer and cost effective. There is no one size fits all. Companies should examine UC security from a business perspective by defining goals, policies, and patterns of usage at the get go across all applications data, VoIP, Instant Messaging (IM) and presence, Web and audio/video conferencing. Security policies for all media streams need to be aligned and properly balanced against business risks. We will follow this theme throughout the discussion. 2

3 UC Security Best Practices 1. Introduction Business agility has become the mantra for 21 st Century success in an increasing global economy, and UC is a leading technology supporting its attainment by enabling organizations to embed communications and collaboration into business processes. Individual productivity gains, while showing improved performance without impact on process outcomes, are still unlikely to improve competitive positioning or the delivery of products and services. Contextual collaboration, on the other hand, across customers, employees, suppliers, the channel and among strategic partners will accelerate innovation, time tomarket, information driven decision making, and create the cost efficiencies that define sought after best in class business agility. Companies of all sizes are adopting unified communications and the collaboration capabilities it fosters to boost productivity and innovation, increase mobility and enhance flexibility. Upon interviewing 315 network and telecommunications decision makers at European enterprises, Forrester 1 finds that enterprise implementation of VoIP in Europe is firmly entering the mass adoption phase. Most enterprises (76%) are going down the IP PBX route either installing the equipment on their own premises or contracting a managed service from a hosting center. UC is firmly on the agenda 35% of firms say UC is a priority, and 18% have implemented some element of UC. In that same context,, a Dimension Data 2 sponsored survey of 390 IT managers and 524 end users across 13 countries in the United States, Asia Pacific and Europe, Middle East and Africa found that most organizations have already invested in infrastructure technologies, with 37% of companies currently using IP telephony, followed by 36% using a video conferencing infrastructure. Although mobile VoIP is not widely used, an investment is on corporate agendas, in the next two years. The findings show that organizations view click to dial on desktops (52%), and presence (42%) as maturing technologies that will be routinely used in the corporate environment within two years. Moreover, The United States leads the way in IP telephony adoption (60%) with Middle East and Africa having the lowest penetration at 13%. AMI Partners 3 reports that small and medium businesses (SMBs) are gravitating towards UC without even realizing it. Based on its survey of 1500 companies, AMI finds that SMBs have a strategic interest in business continuity, enhanced connectivity, collaboration, mobility, and standardized IT infrastructure which are all foundational elements of a comprehensive UC portfolio. 1 The State Of Enterprise VoIP And Unified Communications Adoption In Europe: 2007, December 6, 2007, 2 Unified Communications Adoption Outpaces Expectations, August 20, 2007, 41FF 412C 932C CAE4D964A7A9/7615/UNIFIEDCOMMUNICATIONSADOPTIONOUTPACESEXPECTATIONS1.pdf. 3 Driving Unified Communications & Collaboration in the SMB Market the Business Focused Web2.0, October 2007, partners.com/ami/sections/studies/uc_telecom_report_toc.pdf. 3

4 Clearly, within the context of UC driven communications enabled business processes, converged voice and data IP networks are being entrusted to carry the essential functions of conducting business to and from the remote worker, the supply chain and the partner ecosystem. And in doing so these networks must be secured in a manner that: Complies with all applicable laws and regulations; Prevents leaks of customer records; Protects intellectual property and proprietary information; and Preserves corporate brands and reputations. Yet according to an In Stat survey of IT professionals at 299 US businesses about their security plans for VoIP technology, No mechanisms for securing VoIP had more than 50% penetration across all sizes of business, says Victoria Fodale 4, In Stat analyst. Our purpose here is to set out, in non technical terms, best practices for securing UC. The key to securing UC requires considering voice, data, and video communications as a system and implementing a multilayered, uniformly applied defense construct for the system infrastructure, call management, applications, and endpoints. The solution should be layered, with multiple controls and protections at multiple network levels. This minimizes the possibility that a single point of failure could compromise overall security. If a primary security layer is breached other defensive barriers are available to deter the attack. Now a UC network is complex, consisting as it does of a wide range of components and applications such as telephone handsets, conferencing units, mobile units, call managers, gateways, presence servers, routers, servers, firewalls, specialized protocols and applications linkages. The good news is that VoIP, IM, and video are all applications running on an IP network, and all of the security technologies and policies that companies have deployed for their data networks can be tuned to emulate the security level currently enjoyed by Public Switched Telephone Network (PSTN) users of Plain Old Telephone Service (POTS). In many cases, even if a concerted effort to deploy data network security has not been implemented, the technology likely already exists in your network if you have modern switches, routers and security appliances. In fact, taking a network centric approach will lead to improved manageability and deployment through reduced complexity and more efficient trouble shooting, which all lead to lower total cost of ownership. The bottom line is that the confidentiality, integrity, and availability of critical multimedia resources must be ensured while maintaining the UC solution s performance. Security features should be transparent to the user, standards based, simple to administer and cost effective. There is no one size fits all. Companies should examine UC security from a business perspective by defining goals, policies, and patterns of usage at the get go across all applications data, VoIP, IM and presence, Web and audio/video conferencing. Security policies for all media streams need to be aligned and properly balanced against business risks. We will follow this theme throughout the discussion. 4 US Businesses Lag In Securing VoIP, In Stat Press Release March 24, 2008, 4

5 2. UC Security Best Practice Recommendations Below we will take the BDM through a non technical discussion of best practices for securing UC with emphasis on VoIP. Key security related terms will be aggregated for later reference in a glossary at the end of the white paper. 2.1 Getting Started Plan the Work and Work the Plan A UC security strategy should be developed in the formalized context of enterprise risk management. Enterprise risk management is: A process, ongoing and flowing through an enterprise; Affected by people at every level of an organization; Applied in a strategy setting; Applied across the enterprise, at every level and unit, and includes taking an enterprise wide portfolio view of risk; Designed to identify potential events that, if they occur, will adversely affect the enterprise and the associated risk managed within the enterprise s risk appetite; Able to provide reasonable assurance to enterprise management and board of directors; and Geared to achievement of objectives in one or more separate but overlapping categories. This is a collaborative cross organizational team effort requiring participation from many players representing the networking, security, telecom, legal and business sides of your organization. It s also appropriate at the start of any UC project to involve your service provider security representatives and possibly a security consultant. In particular, ask your carrier how they can help you mitigate Distributed Denial of Service (DDoS) and botnet attacks. The team s first project step is to establish strategic objectives that are aligned with and support the enterprise s mission, support compliance with applicable laws and regulations, and reflect management s appetite for risk. In carrying out its mission the team must be charged with effective use of resources, development and deployment of reliable reporting, ongoing monitoring and those security system optimization processes that will allow the enterprise to migrate over time to richer security implementations. Performance of a security assessment comes next. Assessments identify security gaps so they can be managed effectively. From the security perspective everybody is under threat, but by varying degrees. Invite your project team to a brain storming session. Begin by posing questions such as: What kind of information are we holding? What would happen if somebody got a hold of that information? What kind of legal and regulatory environments are we dealing with? Whose presence status and location must be protected? What would happen if there was a UC system outage? How visible a target do we consider ourselves to be? Once you ve drawn up a comprehensive list of threats, move on to assess: the interdependencies between the threats, the feasibility of each of the threats, the quantitative impact of each threat, and 5

6 finally a prioritization of mitigation actions for each of the potential threats. You must feel confident that you can acceptably manage and mitigate the risks to your corporate information, system operations, and continuity of essential operations when deploying UC technology. Attacks on UC systems can be broadly categorized into the following five types: (1) Confidentiality (or privacy), which includes call eavesdropping, call recording and voic tampering; (2) Integrity (or authenticity), which includes registration hijacking, caller ID spoofing, and sound insertion; (3) Availability, which includes denial of service attacks, buffer overflow attacks, and malware; (4) Theft, which includes toll fraud (service theft) and data theft through masquerading data as voice and data network crossover attacks; and (5) Voice Spam, known as SPIT, which includes unsolicited calling, unified mailbox stuffing, and Vishing (voice phishing). Categorization of VoIP Threats Threat Type Examples Impact Confidentiality Eavesdropping Call Recording Voic tampering Leakage of sensitive or confidential information Compromised corporate assets Identity theft Blackmail Integrity (or Authenticity) Availability Theft SPIT Registration hijacking Caller ID spoofing Sound Insertion Denial of Service Buffer overflow attacks Worms & Viruses Service theft o Toll fraud Data Theft o Masquerading data as voice o Data network x over attacks Unsolicited Calling Mailbox stuffing Vishing Disruption and Chaos Identity theft Service Outages with impact on revenue and brand image Extortion Lost productivity Excessive subscriber phone bills Lost carrier revenues Loss of trade secrets, confidential data, etc. Industrial espionage Reduced productivity and co op of system resources Identity theft Financial loss Confidentiality refers to the enterprise s need to keep the non public customer/client/partner data that it possesses both secure and private. Regulatory compliance raises the stakes significantly in the quest for effective UC security. Examples of confidentiality threats are: call eavesdropping, call recording and voic tampering. Measures such as Health Insurance Portability and Accountability Act (HIPAA), Sarbanes Oxley (SOX), European Basel II and the Gramm Leach Bliley Act (GLB) pose a range of potential legal and financial liabilities 5. In addition, any findings of non compliance or failure to comply with the required disclosure of security breaches can yield adverse publicity and the loss of business and brand value. To 5 Other legislation and regulations include: E 911 laws in 17 states, security breach laws in more than 34 states, Federal Information Security Management Act (FISMA), Federal Financial Institutions Examination Council (FFIEC), Supervisory Control and Data Acquisition (SCADA), Payment Card Industry Data Security Standard (PCI DSS) and the Committee of Supporting Organizations (COSO) Enterprise Risk Management Framework. 6

7 demonstrate full compliance with the security mandates your business must not only prevent malicious attacks from outside the organization, but also take necessary and prudent measures to protect against internal risks. Integrity of information means that information remains unaltered by unauthorized users. That is, information cannot be changed in transit or at rest without being detected, and that malicious or unwanted data can be blocked, filtered, or otherwise kept away from both servers and users. Integrity threats include any event in which system functions or data may be corrupted, either accidentally or as a result of malicious actions. Misuse may involve legitimate users (i.e. insiders performing unauthorized operations) or intruders. Authentication provides a mechanism to verify that a user or client is legitimate and has clearance for a given level of access. This is normally accomplished through the use of strong passwords that are centrally administered. Also, at the user level, company employees should be trained and assessed against high risk security behavior. Malicious integrity (or authenticity) threats take the form of registration hijacking, caller ID spoofing, and sound insertion. Availability refers to the principle that data and services are available for use when needed. Availability is a critical part of overall security planning. Attacks exploiting vulnerabilities in the call management software or protocols may lead to deterioration or even denial of service, or functionality of the call server. In addition, special consideration should be given to E 911 emergency services communications, because E 911 automatic location service is not available with VoIP in some cases (for example Microsoft Office Communications Server 2007). 2.2 Take a Multi layered Approach to Protecting Your Network Infrastructure Securing the network perimeter, though absolutely necessary, is no longer sufficient. The growing internal threat, increasingly mobile workforce, more critical servers being placed on the network, and more attacks coming in on common ports have exploited flaws in the traditional firewall centric security solution. A more mature and enlightened market is evolving towards the notion of layered security solutions. The core network layer protection includes an application aware firewall and Intrusion Detection/Prevention Systems. Protection around the communications layer involves VoIP encryption. Perimeter security, as applied to UC solutions would infer that the voice network be segregated wherever possible, so that unwanted traffic between the voice and data network is constrained. Endpoint security must include mechanisms to control access to the devices. Password control policies must be enforced so that passwords are changed regularly and strong passwords always used Segregate Voice and Data Traffic on Separate VLANs A basic technique for voice security is to assign voice and data on logically separate networks (Virtual LANs or VLANS) due to their different Quality of Service 6 (QoS) and security requirements. In addition, 6 See Critical Success Factors in Design and Performance Management of UC Networks, March 2008, An in depth discussion is provided of VoIP s requirements for both QoS, which concerns measurement of the treatment of the packets traversing a network including utilization, response time, latency (delays), delay variation, packet loss, jitter and availability and application performance 7

8 traffic sent over the voice VLAN is not visible to insiders or outsiders connected to data VLANs, and data traffic cannot cross over to the voice VLAN. LAN Ethernet switches should be equipped with 802.1p prioritization so they can identify and prioritize traffic based on VLAN tags and support multiple queues. VLAN tagging ensures that data traffic from PC softphones takes a separate VLAN from voice traffic. Voice traffic is very delay sensitive and must be prioritized over data on these VLANs so that it gets through even during a network attack. Establishing separate departmental voice VLANs will deter toll fraud by preventing employees from trying to use another department s VLAN for toll calls to avoid increasing their own phone bills. It s also good practice to segregate the management traffic on its own VLAN, together with host authentication, to minimize the likelihood of unwanted access to the call control servers. When creating the VLAN, be sure to place its equipment behind separate firewalls. This practice will restrict traffic crossing VLAN boundaries and prevent viruses and other kinds of malware from spreading from clients to servers. When looking for firewall technology, be sure to examine products that support both leading standards: Session Initiation Protocol (SIP) and the International Telecommunication Union's H.323 protocol. In conjunction with VLANs, companies can set up voice Access Control Lists (ACLs) for departments, workgroups, and individuals. Access control lists are an important part of the toolset a network administrator has at his/her disposal to monitor and control access into a VoIP network. ACLs on the networking layer can be used to prevent inbound data packets used in DoS attacks from entering the voice VLAN. ACLs are also instrumental in defending against eavesdropping and call interception by preventing voice traffic from crossing over to an untrusted portion of the network Authentication and Security Features such as IEEE 802.1x and Access Control Lists are not enough It is important to understand that use of authentication and security features such as IEEE 802.1x and access control lists, while an integral part of an organization's threat defense policies, cannot prevent the data link layer attacks such as "Man in the middle" attacks using Gratuitous Address Resolution Protocol (GARP) and Dynamic Host Configuration Protocol (DHCP) server spoofing. These attacks exploit normal protocol processing such as a switch's ability to learn Media Access Control (MAC) addresses, end station MAC address resolution via ARP, or DHCP server IP address assignments. DHCP server spoofing is prevented by defining trusted ports which can send DHCP requests and acknowledgements, and untrusted ports which can forward only DHCP requests. The Cisco Catalyst switch, for example, assumes that trusted ports are those that connect to either the DHCP server itself, or switched ports, such as uplinks, that in turn connect the switch to the rest of the network. This management with its focus on the unique VoIP Quality of Experience (QoE) requirements associated with differing business scenarios. 8

9 thwarts malicious users acting as a network DHCP server and sending out incorrect addresses under the pretense of being the default gateway, and intercepting data traffic. In addition, by intercepting all DHCP messages within the VLAN, the switch can act much like a small security firewall between users and the DHCP server, building a binding table containing client IP address, client MAC address, port, and VLAN number. Before an endpoint can talk to another endpoint it must make an ARP request to map the IP address to the MAC address. The most effective way for an attacker to eavesdrop a connection is to spoof the default gateway by sending a gratuitous ARP reply containing the IP address of the default gateway to other devices on the LAN. The gratuitous ARP packet causes the devices to overwrite the old entry with the new one, effectively making the attacker the new default gateway for those devices. The attacker can use IP forwarding to relay the traffic between the devices and the default gateway without the other devices being aware of what is happening. GARP attacks can be prevented through Dynamic ARP Inspection (DAI), which helps to ensure that the access switch relays only "valid" ARP requests and responses. DAI inspects all ARPs and compares them to the DHCP Binding table. If ARP does not match the binding table the ports are shut down. The increasing trend towards the use of softphone clients poses a problem for architectures that rely purely on VLAN separation and access control lists. In these deployments the voice capable devices are not only on the Phone VLAN but also on the data VLAN since the soft clients are applications that operate on a user s desktop. With the increased adoption of unified communications applications such as presence and instant messaging this trend is likely to grow. The impact of the soft client is that it becomes difficult to distinguish between a genuine desktop that has a legitimate voice soft client and a rogue device. Access control lists are stateless and can only filter IP addresses and ports. With IP voice protocols, such as SIP, negotiate the port to be used in a voice call from a wide range of ports (16384 to for audio). Access control lists must open up this entire range as it is impossible for the access control list to predict which ports will be used, resulting in a range of exposed ports that attackers can use for reconnaissance. To mitigate this threat, a new generation of proxy devices, often integrated with unified communications aware firewalls, is providing services for secure VLAN traversal for soft clients. Often enforcing device authentication to protect the call control infrastructure from rogue endpoints and then manipulating the signaling to force the media through a trusted device in the network, these proxy services can enable enterprises to build securely upon their existing VLAN and ACL based architectures. The Cisco Adaptive Security Appliance 5500 Series (ASA) for example has been enhanced to support this functionality Protect the Application Platform with Secure Management Best Practices Protect the integrity of management systems. Segregate management traffic on its own VLAN. Use a multilevel administration permissions construct. Organizations must define administrators roles and restrict the functions they can use. Read only privileges are assigned to most administrators, reserving read write privileges for a few trusted individuals. 9

10 Validate administrators and their permissions prior to allowing them management access to voice applications. Require administrators to log in at a physical interface different from the call processing interface, and one that is not accessible to most people. Administrators are allowed access to the management interface only after being authenticated and authorized for the task. Centrally administered strong passwords are a needed here. Encrypt management traffic to prevent interception or eavesdropping. Use IP Security (IPsec) or Secure Shell (SSH) for all remote management and auditing access. If practical, avoid using remote management at all and perform IP PBX access from a physically secure system. Maintain detailed audit trails by logging security alerts, errors, traffic monitoring, etc. With system event logging, administrators are aware of and able to quickly respond to issues that could compromise network integrity or user security. Harden operating systems. Once UC security is established you must be ever vigilant to deploy only those features in your UC products that are consistent with your UC security policy. Workstations, servers, and desktop IP phones typically arrive from the vendor installed with a multitude of development tools and utilities, which, although beneficial to the new user, also provide potential backdoor access to an organization's systems. Therefore, remove of all nonessential tools, utilities, and other systems administration options, any of which could be used to ease a hacker's path to your systems. This action enforces the policy that only authorized people can access and change information pertaining to the UC system. Then ensure that: (1) all appropriate security features are activated and configured correctly, and (2) that patch management systems routinely pass out anti X software and operating system updates Virtual Private Networks (VPNs) Provide a Secure Pathway for Communication with Remote Workers VPNs have a built in encryption feature that enables secure connectivity with branch offices and business partners that are unreachable by private networks. Even road warriors can log in to the VPN from their PCs. VPNs create logical tunnels between two endpoints that allow for data to be securely transmitted between the nodes. An encrypted VPN tunnel provides network, data, and addressing privacy by scrambling data so that only the designated parties understand it. This secures the identities of both the endpoints and protects the VoIP traffic flowing across different network components on the corporate LAN as if it were on a private network. Voice and video enabled VPN technology, available in many routers and security appliances, encrypts voice as well as data traffic using IPsec or AES. Encryption is performed in hardware so that firewall performance is not affected. The IPsec ESP (Encapsulating Security Payload protocol) tunnel is a specific kind of VPN used to traverse the Internet in a private manner. IPsec is the standard encryption suite for the Internet Protocol and will be fully supported in IPv6. In ESP Tunnel Mode, IPsec protects both the data and the identities of the endpoints. While providing strong security, IPsec does require significant effort to support dedicated clients on each machine authorized to connect remotely to the network. For this reason, it has become increasingly common for IPsec to be used to protect voice traffic between enterprise sites as part of a site to site VPN, while SSL has become more common for remote access VPN requirements. In addition, 10

11 with IPsec, making structural changes, adding new locations, or connecting with additional networks involves a fair amount of configuration work as each router must be configured to understand all the other routers in the network. This can be a significant maintenance headache if there are many locations involved. As a result of this administrative burden, some vendors have adapted IPsec VPN architectures to enable remote sites to dynamically query and build new site to site connections without requiring each site to be pre configured with a list of all the other potential peers in the network. This scalability and manageability enhancement also allows enterprises to build a more flexible encryption architecture. In addition, moving from hub and spoke topologies to more direct, spoke to spoke designs, provides a more suitable platform for voice services with minimized latency and jitter. SSL (Secure Socket Layer) tunnel VPNs, once viewed as a complement to the IPsec VPN, have evolved as a direct competitor as it provides simplified deployment for remote access VPN. As originally conceived, this type of SSL VPN allowed a user to use a typical Web browser to securely access multiple network services through a tunnel that is running under SSL. The SSL VPN is, today, the most appropriate application layer VPN technology. SSL VPNs provide clientless access on a per application basis that enables the granular security needed to support business productivity by restricting application access to only those with a true need for access. Moreover, starting with a browser session, WAN managers/administrators may offer access choices ranging from completely portable clientless connections through thin client managed sessions with downloadable security features and applicationspecific services to full network connectivity (including routing) that emulates traditional tunnel VPNs, such as IPsec. The browser can be eliminated through the use of a manually installed client, while maintaining connectivity benefits. Additional SSL, User Datagram Protocol (UDP), and IPsec tunnels, acting as network layer VPNs, can be opened dynamically, as needed, to improve QoS for performancesensitive applications, such as VoIP. VPN is not the only option for providing confidentiality to IP voice streams. Access Edge gateways can encrypt Session Initiation Protocol (SIP) call signaling traffic to protect against eavesdropping and support server authentication for remote users and federated 7 sites. This is typically achieved through Transport Layer Security (TLS) encryption for signaling messages and Secure Real Time Protocol (SRTP) for protecting the voice media. Access Edge gateways and voice aware firewalls can also perform filtering tasks, such as blocking traffic from untrusted addresses. More likely than not, enterprises will be federating across different vendors UC environments in order to leverage UC enabled business process productivity enhancements across their supply chain, hopefully with well thought out security solutions. If not done well, sensitive information sent over the public Internet will make easy targets to the ever growing hacker threat. The sidebar overviews Cisco s Adaptive Security Appliance (ASA) 5500 Series features which support secure federated presence. 7 Trusted remote OCS sites (called "federated" sites) that connect over the Internet have access edge servers in their perimeter networks to enable secure call control and voice and video transmission across an organization's firewall. 11

12 Sidebar Cisco UC Perimeter Security Services The Cisco ASA 5500 Series Adaptive Security Appliance is a high performance, multifunction security appliance family delivering converged firewall with application layer and protocol aware inspection services, IPS, network anti X and URL filtering, SSL/IPsec VPN services, encrypted traffic inspection, presence federation and both remote worker hard phone and mobile phone proxy services. The ASA is a key component of the Cisco Self Defending Network. Among its differentiating features are: ASA provides security and inspection capability for Cisco applications (Presence, Unity, MeetingPlace), and third party applications like Microsoft OCS. Any Cisco UC communications encrypted with SRTP/TLS can be inspected by Cisco ASA 5500 Adaptive Security Appliances: o Maintains integrity and confidentiality of call while enforcing security policy through advanced SIP/SCCP firewall services o TLS signaling is terminated and inspected, then re encrypted for connection to destination (leveraging integrated hardware encryption services for scalable performance) o Dynamic port is opened for SRTP encrypted media stream, and automatically closed when call ends ASA enables inter enterprise presence communications between Cisco and Microsoft presence servers and endpoints ASA phone proxy is a teleworker solution that terminates SRTP/TLS encrypted remote endpoints offering benefit of secure remote access without the need for a router at the remote worker s site. Within the enterprise, the ASA phone proxy can be used for voice/data VLAN traversal in the following manner: o All communicator originating from soft clients must be proxied o Soft client communication is restricted to specific VLAN on ASA o Cisco ASA performs inspection on traffic and opens media port dynamically for soft clients As a mobility proxy, the ASA terminates TLS signaling from Cisco Unified Mobile Communicator to Cisco Unified Mobility server and enforces security policies. The ASA is a mandatory component of Cisco s mobility architecture and replaces Cisco Mobility Proxy. 12

13 2.2.5 Firewalls and Intrusion Detection/Prevention Systems VoIP ready firewalls are essential components in the VoIP network and should be used along with state of the art intrusion detection and prevention systems. Firewalls work by blocking traffic deemed to be invasive, intrusive, or just plain malicious from flowing through them. They provide a central location for deploying security policies, and when properly deployed insure that no traffic can enter or exit the LAN without first being filtered by the firewall. An advanced firewall with stateful packet filtering keeps track of the state of network connections (such as Transport Control Protocol (TCP) streams and UDP communication travelling across it.) The firewall is programmed to distinguish between legitimate packets for different types of connections. Only packets matching a known connection state will be allowed by the firewall; others will be rejected. Stateful filtering can grant or deny network access based on time of day, application, IP address, port range and other attributes. Observing normal traffic patterns and then applying appropriate rules can set Media and signal rate limits. If possible, a firewall with application filtering should be utilized. Application filtering is an extension to stateful packet inspection. Whereas stateful packet inspection can determine what type of protocol is being sent over each port, application level filters look at what a protocol is being used for. Applicationlayer firewalls support multiple application proxies on a single firewall. The proxies sit between the client and server, passing data between the two endpoints. Suspicious data is dropped and the client and server never communicate directly with each other. Because application level proxies are application aware, the proxies can more easily handle complex protocols like H.323 and SIP, which are used for VoIP and videoconferencing. Often, by deploying protocol conformance in unified communications aware firewalls, enterprises can mitigate many of the vulnerabilities posted against the leading call control platforms. This is because the vulnerabilities are often exploited by sending malformed packets that can adversely impact the call control system. By applying a rigorous protocol conformance policy, these malformed packets can be filtered within the network rather than attempt to be dealt with by the target machine. Core network layer protection includes Intrusion Detection and Prevention Systems (IDS/IPS) technologies, which compliment firewalls by establishing sensors running on independent hardware platforms throughout the network. These sensors monitor traffic for unwarranted behavior or traffic patterns, and respond accordingly based on pre established rules. Malicious traffic is identified through comparison against typical traffic behavior associated with a list of known attacks. Based on network intelligence, you can adjust and tune for the number and types of checks performed on specific network segments or assets. Network Intrusion Prevention differs from firewalls in that they use a list of known signatures to identify attempts to exploit known vulnerabilities. In contrast, firewalls apply policy which control access and selectively applies security services. Host IDS/IPS technologies serve a similar purpose as their network counterparts, but reside as software on a host machine (server or client) present within the network. The ever growing mobile workforce, continuing increase in the number of attack vectors targeting the actual host machine, and growth in deployment of SSL VPN solutions in many organizations are driving adoption of host based products. 13

14 Traditional network based products, for example, cannot decrypt the traffic on the line and the potential for certain attacks is passed to the host directly. Currently, customers are expanding deployment scenarios to include all mission critical application and data servers, wireless access points, VPN access points, and remote machines. Additionally, there are many compliance issues that can only be measured by an agent on the host deploying predefined and customized behavior based protections. Since a Host IPS (HIPS) security agent intercepts all requests to the system it protects, it has certain prerequisites: it must be very reliable, must not negatively impact performance, must not block legitimate traffic and should be centrally managed for efficient reporting and auditing of activities. Host IDS/IPS technology also includes file integrity, DDoS protection, authentication and OS hardening. As an example of the offerings in this competitive area we take a brief look at the Cisco Security Agent (CSA) which uses behavioral anomaly detection to provide powerful endpoint protection against dayzero threats. CSA uses no signatures, reducing the pressure to update systems, while keeping the host covered during the shrinking vulnerability window. CSA s key features are: Zero update protection based on operating system and application behavior Control of content after decryption or before encryption (e.g., SSL, IPsec) Access control for I/O devices based on process, network location and file content Centralized management and monitoring of events Self Defending Network interaction with such solutions as ASA, Network Access Control, IPS, QoS, Monitoring, Analysis, and Response Systems, etc Use VoIP network encryption Firewalls, gateways, and other such devices can help keep intruders from compromising a network. But unless the VoIP network is encrypted, anyone with physical access to the office LAN could potentially tap into telephone conversations 8. Moreover, firewalls, gateways and such don t protect voice packets traversing the Internet. Encryption at the protocol level is necessary to defeat eavesdropping attacks. Transport Layer Security (TLS) and IPsec are two main encryption methods. Both protocols aim to keep unauthorized parties from interfering with or listening to calls, and they are almost impossible to manipulate externally. To install multiple encryption layers, use Secure Real Time Protocol (SRTP) at the communications layer for media encryption and TLS for signaling. Encrypting the actual content of communications between users (media encryption) prevents eavesdropping into private matters, whether the communication is voice, video or IM. Signaling encryption prevents illicit monitoring or tampering of the signaling that directs network operations, such as call setup and routing, service performance, event recording, billing, etc. Nonetheless, if you use encryption it s imperative to have in place a solution that terminates and inspects UC communications encrypted with SRTP/TLS, then re encrypts the media and signaling for connection to its destination. Without such inspection, malicious traffic could enter the organization. 8 You might not need traffic encrypted at the LAN, but you certainly will want to encrypt it at the router as it traverses the WAN. Seriously consider security solutions that offer the flexibility to have either encryption off the handset or encryption in bulk over the WAN links. 14

15 Authentication and encryption without inspection can give a false sense of security. This is particularly valuable in a contact center where you require encrypted calling between the service representative and the customer, but you want to allow supervisory intercept for quality control purposes Gateways and switches should use IPsec or SSH instead of other clear text protocols as the remote access protocol. If web based interface is provided, Secure HyperText Transport Protocol (HTTPS) should replace HTTP. If practical, avoid using remote management at all and do IP PBX access from a physically secure system. Voice over Wireless LAN (VoWLAN) traffic may be secured with the same techniques used to protect wireless data traffic. The Wi Fi Protected Access program version 2 (WPA2) and IEEE standard i both support the Advanced Encryption Standard (AES), which provides U.S. government level protection. With encryption key sizes of up to 256 bits, AES is considered extremely secure Maintain Adequate Physical Security and Power Backup Even if encryption is used, physical access to UC servers and gateways may allow an attacker to perform traffic analysis or compromise systems. Adequate physical security should be in place to restrict access to UC components. Physical securities measures, including barriers, locks, access control systems, and guards, are the first line of defense. You must make sure that the proper countermeasures are in place to mitigate the biggest risks, such as insertion of sniffers or other network monitoring devices. Installation of a sniffer could result in not just data, but all voice communications being intercepted. In addition, allow for sufficient power backup and the ability to rollover your voice calls to the PSTN should your IP WAN experience an outage Use Network Access/Admission Control (NAC) According to Wikipedia, Network Access (or Admission) Control is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication, and network security enforcement. Network Computing (NWC) 9 identifies five technology functions that are accepted and expected as part of a NAC product, based on interviews with 303 NWC readers directly involved in deploying or evaluating network access control, and reviews of vendor collateral: 1. Pre connect host posture assessment 2. Host quarantine and remediation 3. Network access control based on user identity 4. Network resource control based on identity and policy 5. Ongoing threat analysis and containment. 9 NAC Vendors Square Off, Network Computing Magazine, July 6, 2006, pp.55 64, 15

16 Most individuals surveyed were focused on two main pain points: identifying and policing user access to the network, and eliminating threats brought onto the network by infected hosts. These pain points reflect the fact that many organizations have issues with non corporate assets connecting to their network, such as employee owned devices or devices brought in by guests and visitors. Discovering when these devices connect to the network and limiting their access based on corporate policy is an ongoing challenge. These devices are typically not managed by central IT patch management tools. The bottom line is that while establishing responsible computing guidelines, requiring user authentication, and passing out anti virus software and operating system updates through patch management systems are necessary security steps, they are not sufficient. The added step of using the network to enforce policies ensures that incoming devices are compliant. Those judged to be vulnerable and noncompliant are quarantined or given limited access until they reach compliance. Depending on vendor, NAC policies can permit, deny, prioritize, rate limit, tag, re direct, and audit network traffic based on user identity, time and location, device type, and other environmental variables. Regulatory compliance is a key driver in NAC demand according to the Network Computing s research. Their survey shows that 96 percent of respondents indicated they are governed by at least one government or industry regulation, and many CEOs and CTOs are mandating the deployment of NAC. Solutions that couple with identity management greatly improve accountability. 16

17 3. Summary of UC Security Best Practices The drive for business agility is spurring companies of all sizes to adopt unified communications as a primary vector for enhanced communication and collaboration capabilities among remotely located and mobile employees, its supply chain and partner ecosystem, and with customers. These benefits, however, do not come without risks. Introduction of an IP based UC communications and collaboration solution introduces an array of new vulnerabilities into the enterprise, and a growing number of malicious programs are exploiting these weaknesses. The good news is that VoIP and IM are applications running on an IP network, and all of the security technologies and policies that companies have deployed for their data networks can be tuned to emulate the security level currently enjoyed by PSTN users of POTS. In many cases, even if a concerted effort to deploy data network security has not been implemented, the technology likely already exists in your network if you ve recently purchased a switch or router. The key to securing the UC network requires considering voice, data, and video communications as a system and implementing a multilayered, uniformly applied defense construct for the system infrastructure, call management, applications, and endpoints. The solution should be layered, with multiple controls and protections at multiple network levels. This minimizes the possibility that a single point of failure could compromise overall security. If a primary security layer is breached, other defensive barriers are available to deter the attack. In summary, best practices entail: Treat the development of a UC security program as a collaborative cross organizational project. Involve your carrier and an outside security consultant if necessary. Bottom line, plan the work and work the plan. The first step is to perform a security assessment. Assessments identify security gaps so they can be managed effectively. Any actionable risk assessment needs five key factors considered a comprehensive list of threats, the interdependencies between the threats, the feasibility of each of the threats, the quantitative impact of each threat, and finally a prioritization of mitigation actions for each of the potential threats. You must feel confident that you can acceptably manage and mitigate the risks to your corporate information, system operations, and continuity of essential operations when deploying UC systems. And remember, there is no one size fits all. Companies should examine UC security from a business perspective by defining goals, policies, and patterns of usage at the start across all applications data, VoIP, IM and presence, Web, and audio/video conferencing. Security policies for all media streams need to be aligned, and compliance with applicable laws and regulations must be properly implemented and properly balanced against business risks. Only then can costs be reconciled with benefits. In fact, taking a network centric approach will lead to improved manageability and deployment through reduced complexity and more efficient troubleshooting, which all lead to lower total cost of ownership. The flexibility of this approach will simplify migration over time to richer security implementations, if required by legal/regulatory requirements, change in risk appetite, or growing sophistication and maliciousness of hacker attacks. 17

18 Area of Protection Infrastructure Call Management Applications (Includes Toll Fraud) Endpoints Balancing Security Solution Cost against Risk of Security Breach Low Security Cost & Risk Separate voice/data VLANS Basis network layer ACLs Traffic Prioritized with QoS on the Network Approved antivirus Patches Strong admin credential policy Standalone HIPS security agent Approved antivirus Patches Strong admin credential policy Conf call drop w/ initiator s departure Standalone HIPS security agent Disable Gratuitous ARP on phones Signed firmware & configurations Disable PC voice VLAN access Medium Security Cost & Risk Stateful inspection firewalls Network rate limiting (Switch/Router/Firewall) IDS monitoring Dynamic ARP inspection DHCP snooping Multi level admin Managed HIPS security agent Forced account codes Dialing filters Managed HIPS security agent X.509 Certificates in IP phones SSL VPN for remote access softphones Phone Proxy for remote IP phones High Security Cost & Risk App aware firewall with w/ TLS Proxy for inspection of encrypted traffic 802.1x for all endpoints NAC w/ hosted IPS IPS monitoring & prevention Scavenger class less than best effort queuing for anomalous, peer topeer & entertainment traffic Centralized network admin for authentication & authorization TLS Signaling & SRTP media encryption Adv OS Hardening IPSec/TLS & SRTP gateways IPSec/TLS & SRTP to apps TLS Signaling & SRTP media encryption Encrypted configuration files Managed HIPS security agent (softphone) Assign voice and data on logically separate networks (VLANS) due to their different QoS and security requirements. Make sure your Ethernet switches are equipped with 802.1p prioritization so they can identify and prioritize traffic based on VLAN tags and support multiple queues. 18

19 Protect the integrity of management systems. Segregate management traffic on its own VLAN. Use encryption, administrator access control, and activity logging. Use VPNs to provide a secure pathway for communication with remote workers. A VPN s built in encryption feature enables secure connectivity with branch offices and business partners that are unreachable by private networks. Voice and video enabled VPN (V3PN) technology, available in many routers and security appliances, encrypts voice as well as data traffic using IPsec or AES. Encryption is performed in hardware so that firewall performance is not affected. Implement VoIP ready firewalls capable of handling the latency sensitive needs of voice traffic. Such firewalls provide rich granular controls, protocol conformance checking, protocol state tracking, security checks, and NAT services. These are essential components in the VoIP network. If possible, a firewall with application filtering should be utilized. Application filtering is an extension to stateful packet inspection. Whereas stateful packet inspection can determine what type of protocol is being sent over each port, application level filters look at what a protocol is being used for. In addition, state of the art intrusion detection and prevention systems should also be installed. Use VoIP network encryption. TLS and IPsec are two main encryption methods. Make sure your firewall can provide for the inspection of encrypted voice traffic. Apply adequate physical security to restrict access to VoIP components. Even if encryption is used, physical access to VoIP servers and gateways may allow an attacker to do traffic analysis or compromise the systems. Physical securities measures, including barriers, locks, access control systems, and guards are the first line of defense. In addition, allow for sufficient power backup and the ability to rollover your voice calls to the PSTN should your IP WAN experience an outage. Implement Network Access (or Admission) Control in order to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement so that network access is contingent on compliance with established security policies. Train everyone in the enterprise on their responsibility for executing enterprise risk management in accordance with established directives and protocols. Pictorially your secure UC infrastructure will look like this. 19

20 Secure UC Solution Regional Office Call Mgmt Security Agent (HIPS) Antivirus Call Mgmt Port Security Router/GW VLAN s Fraud Protection (dial plans) Internet IP WAN Secure transport (VPN) NAC DPS/IPS Private Addresses Application firewall Headquarters Encryption IP WAN Router/GW Mobility Proxy Authenticated Routing Branch Office Road Warrior Phone Proxy Telecommuter 20

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Cconducted at the Cisco facility and Miercom lab. Specific areas examined Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Securing SIP Trunks APPLICATION NOTE. www.sipera.com

Securing SIP Trunks APPLICATION NOTE. www.sipera.com APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)

More information

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Mitigating the Security Risks of Unified Communications

Mitigating the Security Risks of Unified Communications 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Mitigating the Security Risks of Unified Communications Fernando Almeida 1 +, Jose

More information

VOICE OVER IP SECURITY

VOICE OVER IP SECURITY VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Enterprise Computing Solutions

Enterprise Computing Solutions Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company

More information

VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006

VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006 VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006 VoIP technology has the tech geeks buzzing. It has been touted as: - the killer of telecoms - a solution

More information

FDIC Division of Supervision and Consumer Protection

FDIC Division of Supervision and Consumer Protection FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering

More information

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method. A Brief Overview of VoIP Security By John McCarron Voice of Internet Protocol is the next generation telecommunications method. It allows to phone calls to be route over a data network thus saving money

More information

Best Practices for Securing IP Telephony

Best Practices for Securing IP Telephony Best Practices for Securing IP Telephony Irwin Lazar, CISSP Senior Analyst Burton Group Agenda VoIP overview VoIP risks Mitigation strategies Recommendations VoIP Overview Hosted by VoIP Functional Diagram

More information

Multi-layered Security Solutions for VoIP Protection

Multi-layered Security Solutions for VoIP Protection Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

An outline of the security threats that face SIP based VoIP and other real-time applications

An outline of the security threats that face SIP based VoIP and other real-time applications A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance White Paper Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance Troy Herrera Sr. Field Solutions Manager Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA

More information

Security Features and Considerations

Security Features and Considerations Securing the Unified Communications Enabled Enterprise Integrated communications systems are inherently more secure than traditional standalone phone and messaging systems. Business Communications Challenges

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

Securing Unified Communications for Healthcare

Securing Unified Communications for Healthcare Securing Unified Communications for Healthcare Table of Contents Securing UC A Unique Process... 2 Fundamental Components of a Healthcare UC Security Architecture... 3 Making Unified Communications Secure

More information

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015 NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,

More information

SIP Security Controllers. Product Overview

SIP Security Controllers. Product Overview SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running

More information

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

Voice Over IP and Firewalls

Voice Over IP and Firewalls Introduction Voice Over IP and Firewalls By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com Use of Voice Over IP (VoIP) in enterprises is becoming more and more

More information

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection. A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based

More information

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region

IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Cisco IOS Advanced Firewall

Cisco IOS Advanced Firewall Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates

More information

Ingate Firewall/SIParator SIP Security for the Enterprise

Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Firewall/SIParator SIP Security for the Enterprise Ingate Systems February, 2013 Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?...

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP Connecting MPLS Voice VPNs Enabling the secure interconnection of Inter-Enterprise VoIP Executive Summary: MPLS Virtual

More information

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network Release: 1 ICTTEN5168A Design and implement an enterprise voice over internet protocol and

More information

Cisco ASA 5500 Series Unified Communications Deployments

Cisco ASA 5500 Series Unified Communications Deployments 5500 Series Unified Communications Deployments Cisco Unified Communications Solutions unify voice, video, data, and mobile applications on fixed and mobile networks, enabling easy collaboration every time,

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Cisco Security Optimization Service

Cisco Security Optimization Service Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless

More information

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information

Threat Mitigation for VoIP

Threat Mitigation for VoIP Threat Mitigation for VoIP Bogdan Materna, VP Engineering and CTO VoIPshield Systems Third Annual VoIP Security Workshop June 2, 2006 Overview Basics VoIP Security Impact Examples of real vulnerabilities

More information

Basic Vulnerability Issues for SIP Security

Basic Vulnerability Issues for SIP Security Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation mark.collier@securelogix.com The Session Initiation Protocol (SIP) is the future

More information

Securing end devices

Securing end devices Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security

More information

Challenges and opportunities for Open Source solutions

Challenges and opportunities for Open Source solutions GDS20910 39HA83090K2 D3 S20910 328MGD 7 W510200RQ1 UT 10 T28GHY620 JH7 BE4ET276 90K2 D39HA83 0K2 D39HA830 8JD6200NS12 RQ1 UTW510200 H7 BE4ET2763J 8HGDOI0912 M1 Y620110 T28GH UTW510200 83090K2 GDS20910

More information

CPNI VIEWPOINT 02/2007 ENTERPRISE VOICE OVER IP

CPNI VIEWPOINT 02/2007 ENTERPRISE VOICE OVER IP ENTERPRISE VOICE OVER IP AUGUST 2007 Abstract Voice over IP (VoIP) is the term used for a set of technologies that enable real time voice or video conversations to take place across IP networks. VoIP devices

More information

COORDINATED THREAT CONTROL

COORDINATED THREAT CONTROL APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Solution Brief. Secure and Assured Networking for Financial Services

Solution Brief. Secure and Assured Networking for Financial Services Solution Brief Secure and Assured Networking for Financial Services Financial Services Solutions Page Introduction To increase competitiveness, financial institutions rely heavily on their networks to

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Internet Content Provider Safeguards Customer Networks and Services

Internet Content Provider Safeguards Customer Networks and Services Internet Content Provider Safeguards Customer Networks and Services Synacor used Cisco network infrastructure and security solutions to enhance network protection and streamline compliance. NAME Synacor

More information

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.

More information

BlackRidge Technology Transport Access Control: Overview

BlackRidge Technology Transport Access Control: Overview 2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service

More information

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria

More information

Firewall Security. Presented by: Daminda Perera

Firewall Security. Presented by: Daminda Perera Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network

More information

Security and Risk Analysis of VoIP Networks

Security and Risk Analysis of VoIP Networks Security and Risk Analysis of VoIP Networks S.Feroz and P.S.Dowland Network Research Group, University of Plymouth, United Kingdom e-mail: info@network-research-group.org Abstract This paper address all

More information

Introducing Cisco Unified Communications Express

Introducing Cisco Unified Communications Express CHAPTER 1 Introducing Cisco Unified Communications Express Cisco Unified Communications Express is an award-winning communications solution that is provided with the Cisco Integrated Services Router portfolio.

More information

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager Should Ask Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting Network Security: 30 Questions Every Manager/Executive Must Answer in Order

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP) 2010 White Paper Series Top Ten Security Issues Voice over IP (VoIP) Top Ten Security Issues with Voice over IP (VoIP) Voice over IP (VoIP), the use of the packet switched internet for telephony, has grown

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

SIP Trunking Configuration with

SIP Trunking Configuration with SIP Trunking Configuration with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper End-to-End Solutions Team Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

VoIP Security regarding the Open Source Software Asterisk

VoIP Security regarding the Open Source Software Asterisk Cybernetics and Information Technologies, Systems and Applications (CITSA) 2008 VoIP Security regarding the Open Source Software Asterisk Prof. Dr.-Ing. Kai-Oliver Detken Company: DECOIT GmbH URL: http://www.decoit.de

More information

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD NATIONAL SECURITY AGENCY Ft. George G. Meade, MD Serial: I732-010R-2008 30 April 2008 Network Infrastructure Division Systems and Network Analysis Center Activating Authentication and Encryption for Cisco

More information

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005 Voice over IP VoIP (In) Security Presented by Darren Bilby NZISF 14 July 2005 Security-Assessment.com Who We Are NZ s only pure-play security firm Largest team of security professionals in NZ Offices in

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

VoIP Security Threats and Vulnerabilities

VoIP Security Threats and Vulnerabilities Abstract VoIP Security Threats and Vulnerabilities S.M.A.Rizvi and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, UK e-mail: info@network-research-group.org This paper presents the

More information

Technical Note. ForeScout CounterACT: Virtual Firewall

Technical Note. ForeScout CounterACT: Virtual Firewall ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

SIP Trunking with Microsoft Office Communication Server 2007 R2

SIP Trunking with Microsoft Office Communication Server 2007 R2 SIP Trunking with Microsoft Office Communication Server 2007 R2 A Dell Technical White Paper By Farrukh Noman Dell Product Group - Enterprise THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY

More information

Top Defense Strategies and

Top Defense Strategies and E-Guide Top Defense Strategies and Security Considerations for Unified Communications (UC) Organizations turn to unified communications as a cost-effective alternative to traditional communication systems.

More information

Network Security Best Practices for IP Telephony

Network Security Best Practices for IP Telephony APPLICATION N0TE ST-0118 July 28, 2005 Product: ShoreTel system System version: ShoreTel5 Release2 Network Security Best Practices for IP Telephony Deploying IP telephony in a secure manner means following

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE

Microsoft Office Communications Server 2007 & Coyote Point Equalizer Deployment Guide DEPLOYMENT GUIDE Microsoft Office Communications Server 2007 & Coyote Point Equalizer DEPLOYMENT GUIDE Table of Contents Unified Communications Application Delivery...2 General Requirements...6 Equalizer Configuration...7

More information

Data Security in a Converged Network

Data Security in a Converged Network Data Security in a Converged Network A Siemens White Paper Author: Contributors: Joel A. Pogar National Practice Manager Secure Network Services Joel.Pogar@icn.siemens.com Jeff Corcoran Solutions Architect,

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information