CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY
|
|
|
- Ralph Hardy
- 10 years ago
- Views:
Transcription
1 CPA SECURITY CHARACTERISTIC MIKEY-SAKKE SECURE VOIP GATEWAY Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1
2 MIKEY-SAKKE Secure VoIP gateway About this document This document describes the features, testing and deployment requirements necessary to meet CPA certification for MIKEY-SAKKE Secure Gateway security products. It is intended for vendors, system architects, developers, evaluation and technical staff operating within the security arena. Section 1 is suitable for all readers. It outlines the purpose of the security product and defines the scope of the Security Characteristic. Section 2 and Section 3 describe the specific mitigations required to prevent or hinder attacks for this product. Some technical knowledge is assumed. For more information about CPA certification, refer to The Process for Performing CPA Foundation Grade Evaluations [a]. Document history The CPA Authority may review, amend, update, replace or issue new Scheme Documents as may be required from time to time. Soft copy location: DiscoverID Version Date Description /2013 Publication This document is derived from the following Security Characteristic (SC) Maps. SC Map MIKEY-SAKKE Secure VoIP Gateway Common Libraries Crypt Libraries Secure Voice Libraries Map version Contact CESG This document is authorised by: Deputy Technical Director (Assurance), CESG. For queries about this document please contact: CPA Administration Team CESG, Hubble Road Cheltenham Gloucestershire GL51 0EX, UK [email protected] Tel: +44 (0) UNCLASSIFIED Page 2
3 Contents Section 1 Overview Introduction Product description Typical use cases Expected operating environment Compatibility Interoperability Variants Additional threat information High level functional components Future enhancements... 9 Section 2 Security Characteristic Format Requirement categories Understanding mitigations Section 3 Requirements Development mitigations Verification mitigations Deployment mitigations Appendix A References Appendix B Glossary UNCLASSIFIED Page 3
4 Section 1 Overview 1.1 Introduction This document is a CPA Security Characteristic. It describes requirements for assured MIKEY- SAKKE [b] Secure Gateway products for evaluation and certification under CESG s Commercial Product Assurance (CPA) scheme. 1.2 Product description Secure Voice over IP (VoIP) clients using MIKEY-SAKKE for identity based encryption can be used to make secure voice calls over untrusted networks. A MIKEY-SAKKE Secure Gateway can provide multiple methods to enable MIKEY-SAKKE VoIP communications between devices by implementing at least one of the two following methods: providing a method to allow data to flow between a VoIP client which does not support MIKEY-SAKKE and one that does by converting between MIKEY-SAKKE protected data streams and unencrypted RTP data streams (described below as a Type 1 Gateway) providing a method of terminating the MIKEY-SAKKE security association and reestablishing it between disparate MIKEY-SAKKE devices (described below as a Type 2 Gateway) and optionally: Reducing bandwidth and processing requirements by only using a limited subset of the RTP protocol over the gateway (typically both the caller and recipient s ID and the voice data) Routing RTP traffic between networks of the same classification but also supporting MIKEY- SAKKE, allowing several calling domains to be joined (described below as a Type 3 Gateway) The gateway is also expected to support both Dial Through 1 and Dial Into 2 dialling plans to ensure compatibility with the network dialling plan that it is being deployed into. The gateway may be used to provide functional connectivity between multiple MIKEY-SAKKE or unencrypted content networks of the same protection level 3. However, it does not aim to mitigate the risk of connecting networks at different protection levels. The gateway must also support the ability to acquire new certificates from a Key Management Server (KMS) once deployed; how this key acquisition is implemented is out of the scope for this document. 1 Where a device is able to directly dial another device on a different network 2 Where a device is required to call a gateway, and once connected can then dial the extension required 3 The protection level is a value derived from both the classification of traffic flowing over the network and the risk the network is under from being attacked. UNCLASSIFIED Page 4
5 UNCLASSIFIED 1.3 MIKEY-SAKKE SAKKE Secure VoIP gateway Typical use cases There are two primary use cases that a MIKEY-SAKKE MIKEY SAKKE Secure VoIP Gateway can be deployed in. in In the following use cases it is assumed that the Key Management Server (KMS) and the gateway are hosted separately Type 1 Gateway The MIKEY-SAKKE Secure VoIP Gateway will be be used to allow communications between MIKEYSAKKE enabled and non MIKEY-SAKKE SAKKE enabled devices. The gateway should terminate MIKEYSAKKE encrypted tunnels and deliver RTP to the correct endpoint within the network by acting as a back-to-back user agent. This is is described below as a Type 1 Gateway. Figure 1 Type 1 Gateway Gateway: communication between MS and RTP VoIP clients Type 2 Gateway This back-to-back user agent gateway will be able to terminate a MIKEY-SAKKE association and re reestablish a new association by potentially using a different KMS. This will enable devices on disparate MIKEY-SAKKE networks to communicate securely without the requirement to share the public keys of other MIKEY-SAKKE KMS servers to devices. MIKEY-SAKKE SAKKE keys will still have to be shared to the gateways (as shown by the established trust link between them in the diagram below) below). This is described below as a Type 2 Gatewayy. Figure 2 Type 2 Gateway: two differentt MS domains communicate, with traffic rekeyed with the destination's MS KMS Gateways can either support one or both of the use cases defined above. UNCLASSIFIED Page 5
6 UNCLASSIFIED MIKEY-SAKKE SAKKE Secure VoIP gateway The gateway can optionally lly support multiple back-to-back user agent interfaces as described below. This type of product routes RTP traffic between networks of the same classification but also supports MIKEY-SAKKE, allowing several calling domains to be joined. The domains are required to be at the same protection level. Figure 3 Communication between two RTP domains of the same protection level and MS communication to a lower level 1.4 Expected operating environment The MIKEY-SAKKE Secure Gateway is expected to be installed within a physically secure environment and logically sited att the boundary of a security domain, bordering a less trusted network (such as the Internet). erated within the local security In the Type 1 Gateway architecture (see Figure 1), traffic that is generated domain for recipients ecipients outside of the domain will be routed to the gateway. The gateway will then apply confidentiality, integrity and/or authentication cryptographic protection, according to rules determined by the gateway s policy. The resultant traffic will then be sent over the less trusted network to the client endpoints. This process is reversed for traffic inbound from the client to the trusted network. 1.5 Compatibility A security gateway product may exist as either a dedicated hardware device or as one or more software modules, deployed on a general purpose platform. In either case, this Security Characteristic does not place any specific specific hardware requirements upon the product beyond its normal technical requirements. For example, some products may have specific CPU or memory requirements in order to function effectively. This Security Characteristic does not define minimum hardware requirements. No specific requirements are placed on the operating system that hosts a software-based software based MIKEY MIKEYSAKKE Secure Gateway (conforming to this Security Characteristic) other than to allow the product to operate correctly whilst meeting the requirements in Section 3.. This said, there is a general expectation that the product will be compatible with the latest version of a given operating system. 1.6 Interoperability This Security Characteristic assumes that the security gateway conforms to to the specifications for MIKEY-SAKKE SAKKE as described in RFCs 6508, and 6509[b],, for SRTP as described in RFC 3711[c], as well as those for RTP as described in RFC 1889 and 3550[d].. Therefore the security gateway should interoperate with other MIKEY-SAKKE SAKKE devices. UNCLASSIFIED Page 6
7 MIKEY-SAKKE Secure VoIP gateway This has the benefit of enabling deployments to make use of a range of different MIKEY-SAKKE clients or gateways based on their particular business and technology requirements. As dialling plans in disparate networks could overlap, the gateway must support both Dial Through and Dial Into dialling plans. For usability reasons, Dial Through is preferred. However, it is recognised that overlapping dialling plans in networks could mean that Dial Through is impossible without a large scale re-architecting of either network. In this case, Dial Into should be used. The profiles below detail the cryptographic requirements around the implementations of MIKEY- SAKKE. Gateways must adhere to at least one of the defined profiles (of which there is currently only one). There will be future profiles created to enable MIKEY-SAKKE gateways to bridge different types of connection e.g. messaging and video. The plain text interface 4 is not required to utilise these profiles MIKEY-SAKKE voice profile The MIKEY-SAKKE voice profile consists of the following protocols, used with the cryptographic parameter configuration detailed in the Technical Specifications No. 63 A MIKEY-SAKKE / SRTP Profile [e]. Component Protocol Media Protocol SRTP RFC 3711 Key Transport MIKEY-SAKKE RFC Key Management Server (KMS) Interactions between the secure gateway product and the KMS are not standardised at this time. However, requirements describing the use of key management servers are given in this document at a high level, and any protocols used by the product must demonstrate the specific behaviours. CESG are currently looking to produce an example to meet these requirements, but the example will not be mandatory to follow. 1.7 Variants This Security Characteristic has the following variant type and associated variants: Variant Type: Gateway Platform: o Software Gateway The secure gateway is software that is deployed onto standard server hardware running a general purpose operating system. o Hardware Gateway The secure gateway is a dedicated appliance, for direct deployment into a network. 1.8 Additional threat information This Security Characteristic does not address the threat of devices at either end of the communication being compromised. Additionally, the host platform is assumed to be free of malware; any risk mitigations may not be effective if the host platform has already been compromised. 4 A plain text interface is one in which traffic flowing to and from it is not encrypted. UNCLASSIFIED Page 7
8 UNCLASSIFIED MIKEY-SAKKE SAKKE Secure VoIP gateway High level functional components 1.9 The following diagram illustrates the various high level functional components within this product. product Components shown with an asterisk(*) represent those relating to specific mitigations listed in Section 3.. These are used to structure the Security Characteristic, and to give context to each mitigation. Figure 4:: Functional co components of a MIKEY-SAKKE Secure Voice Gateway The functional components in Figure 4 are described as follows. Red Interface The connection to a network which does not support MIKEY MIKEY-SAKKE secure voice protocols on the end clients. Red Interface >> IP Red Side IP interface. Red Interface >> RTP When voice traffic is received it is processed as necessary and then handled by the RTP interface. The request is then passed to the Session Encryption component. Black Interface* The connection to a network which is untrusted and has clients supporting MIKEY-SAKKE SAKKE secure voice protocols. Black Interface >> IP Black Side IP interface. Black Interface >> SRTP When secure voice requests are received they are processed as necessary and then handled by the MIKEY-SAKKE MIKEY interface. The request is then passed to the Session Encryption interface Call Handling* Providess the interface with functionality to terminate the SIP call handing protocol. Encryption* Encrypts or decrypts traffic, depending on its source and destination, according to the requirements of the protection level level. Key Acquisition Acquires the MIKEY-SAKKE MIKEY configured profile key required to enable secure communication to occur. occur Key Management* Provides the functionality to use and protect keys provided to the gateway from a KMS server in line with CPA approved techniques. UNCLASSIFIED Page 8
9 MIKEY-SAKKE Secure VoIP gateway Management Provides the functionality to control and configure the security gateway. Management functionality is restricted to authorised administrators use only through an authentication mechanism. The exact details of this authentication mechanism are beyond the scope of this document, but could be provided by either the product or host operating system Future enhancements CESG welcomes feedback and suggestions on possible enhancements to this Security Characteristic. Future enhancements may also include the addition of Session Border Control (SBC) states to allow MIKEY-SAKKE communication channels between different protection levels. UNCLASSIFIED Page 9
10 Section 2 Security Characteristic Format 2.1 Requirement categories All CPA Security Characteristics contain a list of mitigations that describe the specific measures required to prevent or hinder attacks. The mitigations are grouped into three requirement categories; design, verification and deployment, and appear in Section 3 of this document in that order. Development mitigations (indicated by the DEV prefix) are measures integrated into the development of the product during its implementation. Development mitigations are checked by an evaluation team during a CPA evaluation. Verification mitigations (indicated by the VER prefix) are specific measures that an evaluator must test (or observe) during a CPA evaluation. Deployment mitigations (indicated by the DEP prefix) are specific measures that describe the deployment and operational control of the product. These are used by system administrators and users to ensure the product is securely deployed and used in practice, and form the basis of the Security Operating Procedures which are produced as part of the CPA evaluation. Within each of the above categories, the mitigations are further grouped into the functional areas that they relate to (as outlined in the High level functional components diagram (Figure 4)). The functional area for a designated group of mitigations is prefixed by double chevron characters ( >> ). For example, mitigations within a section that begins: Development >> Management - concern Development mitigations relating to the Management functional area of the product. Note: Mitigations that apply to the whole product (rather than a functional area within it) are listed at the start of each section. These sections do not contain double chevron characters. 2.2 Understanding mitigations Each of the mitigations listed in Section 3 of this document contain the following elements: The name of the mitigation. This will include a mitigation prefix (DEV, VER or DEP) and a unique reference number. A description of the threat (or threats) that the mitigation is designed to prevent or hinder. Threats are formatted in italic text. The explicit requirement (or group of requirements) that must be carried out. Requirements for foundation grade are formatted in green text. In addition, certain mitigations may also contain additional explanatory text to clarify each of the foundation grade requirements, as illustrated in the following diagram. Name of the mitigation Threat that this mitigation counters Requirements needed For Foundation Grade Explanatory comment for Foundation Grade requirement DEV.M267: Provide an automated configuration tool to enforce required settings This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the product is required to be provided with a configuration tool, or other method, for an administrator to initially set it up into a suitable configuration. If the product requires more than 12 options to be changed or set by an administrator to comply with these Security Characteristics, the developer must supply a tool or policy template which helps the administrator to achieve this in fewer steps. Figure 5: Components of a typical mitigation UNCLASSIFIED Page 10
11 Section 3 Requirements This section lists the Development, Verification and Deployment mitigations for the MIKEY-SAKKE Secure Gateway Security Characteristic described hence forth as the product. 3.1 Development mitigations DEV.M41: Crash reporting This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to ensure crashes are logged. Where it is possible that sensitive data may end up in the crash data, this must be handled as red data and must only be available to an administrator. Crash data from both the product and the underlying operating system must be considered. DEV.M42: Heap hardening This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product should use the memory management provided by the operating system. Products should not implement their own heap. DEV.M43: Stack protection This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to be compiled with support for stack protection including all libraries, where the tool chain supports it. If more recent versions of the tool chain support it for the target platform then they should be used in preference to a legacy tool chain. DEV.M159: Update product This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product should support the use of software updates. DEV.M267: Provide an automated configuration tool to enforce required settings This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the product is required to be provided with a configuration tool, or other method, for an administrator to initially set it up into a suitable configuration. If the product requires more than 12 options to be changed or set by an administrator to comply with these Security Characteristics, the developer must supply a tool or policy template which helps the administrator to achieve this in fewer steps. DEV.M321: Data Execution Prevention This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to support Data Execution Prevention (DEP) when enabled on its hosting platform and must not opt out of DEP. If the product is to be specifically deployed on a platform that does not support either Software DEP or Hardware-enforced DEP, there is no requirement for DEP compatibility. DEV.M340: Address Space Layout Randomisation This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the product is required to be compiled with full support for ASLR, including all libraries used. If the product is to be specifically deployed on an operating system that does not support ASLR, there is no requirement for ASLR compatibility. Note: ASLR may be disabled for specific aspects of the product, provided there is justification of why this is required. UNCLASSIFIED Page 11
12 MIKEY-SAKKE Secure VoIP gateway DEV.M349: Sanitise temporary variables This mitigation is required to counter reading non-sanitised sensitive data from memory At Foundation Grade the product is required to sanitise temporary variables containing sensitive information as soon as no longer required. A secure erase must consist of at least one complete overwrite. DEV.M353: Ensure product security configuration can only be altered by an authenticated system administrator This mitigation is required to counter unauthorised alteration of product's configuration At Foundation Grade the product is required to ensure that only authenticated administrators are able to change the product's security enforcing settings. DEV.M355: Secure software delivery This mitigation is required to counter installing compromised software using the update process At Foundation Grade the product should be distributed via a cryptographically protected mechanism, such that the authenticity of software can be ensured. DEV.M612: Sanitise logged data This mitigation is required to counter supplying a malicious script through logged data At Foundation Grade the product is required to ensure logged data is sanitised prior to display. The method and content of sanitisation will change depending on the content in the logs and where the logs are displayed. For example, output to a HTML viewer for the logs will need to be encoded whereas logging output to a text file may not need to be sanitised. Note: This requirement is only applicable if the product actually incorporates a log viewer. DEV.M627: Protect access to logs This mitigation is required to counter modification of logging generation This mitigation is required to counter sanitisation of illegitimate access from logs At Foundation Grade the product is required to ensure that all log entries are time stamped. Timestamps must be accurate and the deployment must take measures to ensure this. Such measures could be NTP synchronisation or a manual process. At Foundation Grade the product is required to ensure that only an authenticated administrator can manage logs. At Foundation Grade the product is required to not overwrite logs without alerting the administrator. DEV.M802: Export logs This mitigation is required to counter modification of locally stored logs At Foundation Grade the product is required to provide ability to automatically transfer logs to external device. This functionality could be provided by a host operating system, where available. UNCLASSIFIED Page 12
13 MIKEY-SAKKE Secure VoIP gateway DEV.1 - Development >> Black Interface DEV.1.M85: Resource prioritisation This mitigation is required to counter CPU exhaustion through repeated connect requests This mitigation is required to counter memory exhaustion through 'half open' attacks At Foundation Grade the product is required to prioritise resources for connections which are already open. This should be done at the expense of new, unauthenticated connections. At Foundation Grade the product should limit resources which can be consumed by a single client. DEV.2 - Development >> Call Handling DEV.2.M937: Call security identification This mitigation is required to counter interception of sensitive voice data accidentally sent unencrypted At Foundation Grade the product is required to have the ability to send identity information to the caller and to the recipient before the call is answered. This information should detail if the call is encrypted, if the other party is authenticated, who the other party purports to be and which entity has attested to their identity. DEV.3 - Development >> Encryption DEV.3.M138: State the Security Strength required for random numbers This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to employ an entropy source of sufficient Security Strength for all random number generation required in the operation of the product. The developer must state the Security Strength required of their entropy source based on analysis of all random numbers used in the product, including any generated keys. At this grade, the Security Strength is likely to be 128 bits for products that do not use elliptic curve cryptography. For elliptic curve-based asymmetric mechanisms it is likely to be 256 bits, and for finite field based asymmetric mechanisms it is likely to be 192 bits. DEV.3.M140: Smooth output of entropy source with approved PRNG This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to employ a PRNG of sufficient Security Strength for all random number generation required in the operation of the product. For more details on a suitable PRNG, please see the Process for Performing Foundation Grade Evaluations. DEV.3.M141: Reseed PRNG as required This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to follow an approved reseeding methodology. UNCLASSIFIED Page 13
14 MIKEY-SAKKE Secure VoIP gateway DEV.3.M290: Employ an approved entropy source This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to generate random bits using an entropy source whose entropy generation capability is understood. The developer must provide a detailed description of the entropy source used, giving evidence that it can generate sufficient entropy for use in the device, including an estimate of entropy per bit. If a hardware noise source is used, then the manufacturer's name, the part numbers and details of how this source is integrated into the product must be supplied. If a software entropy source is employed, the API calls used must be provided. Where appropriate, details must be given of how the output of multiple entropy sources are combined. DEV.3.M938: Encrypt call traffic over untrusted link This mitigation is required to counter interception of data from unencrypted calls At Foundation Grade the product is required to use an approved encryption profile from section 1.6. DEV.4 - Development >> Key Management DEV.4.M138: State the Security Strength required for random numbers This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to employ an entropy source of sufficient Security Strength for all random number generation required in the operation of the product. The developer must state the Security Strength required of their entropy source based on analysis of all random numbers used in the product, including any generated keys. At this grade, the Security Strength is likely to be 128 bits for products that do not use elliptic curve cryptography. For elliptic curve-based asymmetric mechanisms it is likely to be 256 bits, and for finite field based asymmetric mechanisms it is likely to be 192 bits. DEV.4.M140: Smooth output of entropy source with approved PRNG This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to employ a PRNG of sufficient Security Strength for all random number generation required in the operation of the product. For more details on a suitable PRNG, please see the Process for Performing Foundation Grade Evaluations. DEV.4.M141: Reseed PRNG as required This mitigation is required to counter prediction of randomly generated values due to a weak PRNG At Foundation Grade the product is required to follow an approved reseeding methodology. UNCLASSIFIED Page 14
15 MIKEY-SAKKE Secure VoIP gateway DEV.4.M290: Employ an approved entropy source This mitigation is required to counter prediction of randomly generated values due to a weak entropy source At Foundation Grade the product is required to generate random bits using an entropy source whose entropy generation capability is understood. The developer must provide a detailed description of the entropy source used, giving evidence that it can generate sufficient entropy for use in the device, including an estimate of entropy per bit. If a hardware noise source is used, then the manufacturer's name, the part numbers and details of how this source is integrated into the product must be supplied. If a software entropy source is employed, the API calls used must be provided. Where appropriate, details must be given of how the output of multiple entropy sources are combined. DEV.4.M808: Shared secret generation This mitigation is required to counter capture key exchange messages to deduce shared secrets At Foundation Grade the product is required to use an approved encryption profile from section 1.6. DEV.4.M812: No Private Key export This mitigation is required to counter export of private key material from the device At Foundation Grade the product is required to use operating system mechanisms, such as user privileges and the operating system certificate store, or another protected certificate store, to ensure that unencrypted private keys or machine certificates cannot be retrieved by a standard user. This must include protecting any APIs or interfaces added by the product which have access to the certificate store. DEV.4.M816: Key distribution credentials revocation This mitigation is required to counter using compromised key distribution credentials At Foundation Grade the product is required to ensure that a compromised user or device can be prevented from rekeying. DEV.4.M821: Key Exchange signature checks This mitigation is required to counter spoofing key exchange messages At Foundation Grade the product is required to verify signatures on key exchange messages and reject the call if the signature is invalid or the signing key is untrusted. UNCLASSIFIED Page 15
16 MIKEY-SAKKE Secure VoIP gateway 3.2 Verification mitigations VER.M80: Protocol robustness testing This mitigation is required to counter discovery of a vulnerability in the implementation of the protocol stack At Foundation Grade the evaluator will perform testing using commercial fuzzing tools. Fuzz testing is described in more detail in the Process for Performing Foundation Grade Evaluations. VER.M347: Verify update mechanism This mitigation is required to counter installing compromised software using the update process At Foundation Grade the evaluator will validate the developer's assertions regarding the suitability and security of their update process. The update process must provide a mechanism by which updates can be authenticated before they are applied. The process and any configuration required must be documented within the Security Procedures. VER.1 - Verify >> Encryption VER.1.M4: Evaluation/Cryptocheck This mitigation is required to counter exploitation of a cryptographic algorithm implementation error At Foundation Grade the evaluator will ensure all cryptographic algorithms employed for security functionality have been validated as per the "Cryptographic Validation" section in the CPA Foundation Process document. VER.2 - Verify >> Key Management VER.2.M4: Evaluation/Cryptocheck This mitigation is required to counter exploitation of a cryptographic algorithm implementation error At Foundation Grade the evaluator will ensure all cryptographic algorithms employed for security functionality have been validated as per the "Cryptographic Validation" section in the CPA Foundation Process document. UNCLASSIFIED Page 16
17 MIKEY-SAKKE Secure VoIP gateway 3.3 Deployment mitigations DEP.M38: Use automated configuration tool This mitigation is required to counter exploitation of an accidental misconfiguration At Foundation Grade the deployment is required to be configured using automated tools if provided. DEP.M39: Audit log review This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the deployment is required to regularly review audit logs for unexpected entries. DEP.M131: Operating system verifies signatures This mitigation is required to counter installation of a malicious privileged local service At Foundation Grade the deployment is required to enable signature verification for applications, services and drivers in the host operating system, where supported and where the product makes use of it. DEP.M159: Update product This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the deployment is required to update to the latest version where possible. DEP.M340: Address Space Layout Randomisation This mitigation is required to counter exploitation of a software implementation/logic error At Foundation Grade the deployment is required to enable ASLR in the host Operating System where available. DEP.M348: Administrator authorised updates This mitigation is required to counter installing compromised software using the update process At Foundation Grade the deployment is required to confirm the source of updates before they are applied to the system. The administrator is required to have authorised the updates before use. If an automatic process is used, the administrator must also configure the product to authenticate updates. The update procedure to be used by the administrator must be described within the product's security procedures. DEP.M625: Log all relevant actions This mitigation is required to counter modification of logging generation At Foundation Grade the deployment is required to assess impact of log entries and follow organisational procedures for incident resolution. At Foundation Grade the deployment is required to configure the product to log all actions deemed of interest. Ensure that log data is detailed enough to allow forensic investigation during any incident management. Sensitive data such as passwords and keys must not be written to the logs. At Foundation Grade the deployment should where available, automatically export logs to management/red side device. UNCLASSIFIED Page 17
18 MIKEY-SAKKE Secure VoIP gateway DEP.1 - Deployment >> Key Management DEP.1.M817: Secure private key distribution This mitigation is required to counter interception of private keys during distribution At Foundation Grade the deployment is required to use a private key distribution method which provides confidentiality, perfect forward secrecy and mutual authentication. UNCLASSIFIED Page 18
19 Appendix A References This document references the following resources. Label Title Location Notes [a] The Process for Performing Foundation Grade CPA Evaluations [b] MIKEY-SAKKE RFCs [c] SRTP RFCs [d] RTP RFCs [e] MIKEY-SAKKE SRTP Profiles s/ts63-mikey-sakke-srtp_profile.pdf UNCLASSIFIED Page 19
20 Appendix B Glossary The following definitions are used in this document. Term CPA SC Map Security Characteristic Definition Commercial Product Assurance. A scheme run by CESG providing certificate-based assurance of commercial security products. Diagrammatic representation of a Security Characteristic (or part of one). A standard which describes necessary mitigations which must be present in a completed product, its evaluation or usage, particular to a type of security product. UNCLASSIFIED Page 20
CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT
26579500 CPA SECURITY CHARACTERISTIC SECURE VOIP CLIENT Version 2.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the features, testing and deployment
CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT
29175671 CPA SECURITY CHARACTERISTIC TLS VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the
CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION
UNCLASSIFIED 24426399 CPA SECURITY CHARACTERISTIC ENTERPRISE MANAGEMENT OF DATA AT REST ENCRYPTION Version 1.0 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 UNCLASSIFIED Enterprise Management
CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT
24419250 CPA SECURITY CHARACTERISTIC IPSEC VPN FOR REMOTE WORKING SOFTWARE CLIENT Version 2.1 Crown Copyright 2013 All Rights Reserved UNCLASSIFIED Page 1 About this document This document describes the
UNCLASSIFIED CPA SECURITY CHARACTERISTIC REMOTE DESKTOP. Version 1.0. Crown Copyright 2011 All Rights Reserved
18570909 CPA SECURITY CHARACTERISTIC REMOTE DESKTOP Version 1.0 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for CPA Security Characteristic Remote Desktop 1.0 Document History
UNCLASSIFIED 12686381
12686381 CPA SECURITY CHARACTERISTIC IP FILTERING FIREWALLS Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for IP Filtering firewalls 26/07/2011 Document History Version
CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY
CPA SECURITY CHARACTERISTIC IPSEC VPN GATEWAY Version 2.5 Crown Copyright 2016 All Rights Reserved 48770392 Page 1 of 25 About this document This document describes the features, testing and deployment
UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved
18397081 CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS Version 1.3 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for Web Application Firewalls Document History [Publish
UNCLASSIFIED CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION. Version 1.1. Crown Copyright 2011 All Rights Reserved
11590282 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.1 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for software full disk encryption Document History [Publish
CPA SECURITY CHARACTERISTIC GATEWAY EMAIL ENCRYPTION
11936884 CPA SECURITY CHARACTERISTIC GATEWAY EMAIL ENCRYPTION Version 1.0 Crown Copyright 2016 All Rights Reserved Document History Version Date Description CPA Security Characteristics for Gateway Email
CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE
12040940 CPA SECURITY CHARACTERISTIC DATA SANITISATION - FLASH BASED STORAGE Version 0.3 Crown Copyright 2012 All Rights Reserved CPA Security Characteristics for Data Sanitisation - Flash Based Storage
UNCLASSIFIED CPA SECURITY CHARACTERISTIC SERVER VIRTUALISATION. Version 1.21. Crown Copyright 2012 All Rights Reserved
ID18939561 CPA SECURITY CHARACTERISTIC SERVER VIRTUALISATION Version 1.21 Crown Copyright 2012 All Rights Reserved CPA Security Characteristics for Server Virtualisation 18/05/2012 Document History Version
CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION
27289237 CPA SECURITY CHARACTERISTIC SOFTWARE FULL DISK ENCRYPTION Version 1.23 Crown Copyright 2016 All Rights Reserved Page 1 About this document This document describes the features, testing and deployment
CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES
CPA SECURITY CHARACTERISTIC DATA AT REST ENCRYPTION: ALWAYS-ON MOBILE DEVICES Version 1.1 Crown Copyright 2016 All Rights Reserved 44335885 Page 1 of 6 About this document This document describes the features,
OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT
SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment
UNCLASSIFIED CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION. Version 1.0. Crown Copyright 2012 All Rights Reserved.
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT DESTRUCTION Version 1.0 Crown Copyright 2012 All Rights Reserved Page 1 Document History Version Date Description 0.1 June 2012 Initial Draft Version 1.0 July
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
October 2015 Issue No: 1.1. Security Procedures Windows Server 2012 Hyper-V
October 2015 Issue No: 1.1 Security Procedures Windows Server 2012 Hyper-V Security Procedures Windows Server 2012 Hyper-V Issue No: 1.1 October 2015 This document describes the manner in which this product
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC)
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT PSN CA (IPSEC) Version 1.0 Crown Copyright 2016 All Rights Reserved Page 1 Document History Version Date Description 1.0 October 2013 Initial issue Soft copy
Guidance Regarding Skype and Other P2P VoIP Solutions
Guidance Regarding Skype and Other P2P VoIP Solutions Ver. 1.1 June 2012 Guidance Regarding Skype and Other P2P VoIP Solutions Scope This paper relates to the use of peer-to-peer (P2P) VoIP protocols,
October 2014 Issue No: 2.0. Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
October 2014 Issue No: 2.0 Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services Good Practice Guide No. 44 Authentication and Credentials for use with HMG Online Services
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS
CESG ASSURED SERVICE CAS SERVICE REQUIREMENT TELECOMMUNICATIONS Issue 1.1 Crown Copyright 2015 All Rights Reserved 1 of 9 Document History Version Date Description 0.1 November 2012 Initial Draft Version
Payment Card Industry (PCI) Terminal Software Security. Best Practices
Payment Card Industry (PCI) Terminal Software Security Best Version 1.0 December 2014 Document Changes Date Version Description June 2014 Draft Initial July 23, 2014 Core Redesign for core and other August
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Acano solution. Security Considerations. August 2015 76-1026-01-E
Acano solution Security Considerations August 2015 76-1026-01-E Contents Contents 1 Introduction... 3 2 Acano Secure Development Lifecycle... 3 3 Acano Security Points... 4 Acano solution: Security Consideration
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
90% of data breaches are caused by software vulnerabilities.
90% of data breaches are caused by software vulnerabilities. Get the skills you need to build secure software applications Secure Software Development (SSD) www.ce.ucf.edu/ssd Offered in partnership with
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
HMRC Secure Electronic Transfer (SET)
HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram
Oracle Business Intelligence Enterprise Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on Oracle Enterprise Linux 4 update 5 x86_64
122-B CERTIFICATION REPORT No. CRP250 Business Intelligence Edition (OBIEE) Version 10.1.3.3.2 with Quick Fix 090406 running on update 5 Issue 1.0 June 2009 Crown Copyright 2009 All Rights Reserved Reproduction
SIP Security Controllers. Product Overview
SIP Security Controllers Product Overview Document Version: V1.1 Date: October 2008 1. Introduction UM Labs have developed a range of perimeter security gateways for VoIP and other applications running
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Securing SIP Trunks APPLICATION NOTE. www.sipera.com
APPLICATION NOTE Securing SIP Trunks SIP Trunks are offered by Internet Telephony Service Providers (ITSPs) to connect an enterprise s IP PBX to the traditional Public Switched Telephone Network (PSTN)
Guidance End User Devices Security Guidance: Apple ios 7
GOV.UK Guidance End User Devices Security Guidance: Apple ios 7 Updated 10 June 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform Can
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
VOICE OVER IP SECURITY
VOICE OVER IP SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
U06 IT Infrastructure Policy
Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Applying Cryptography as a Service to Mobile Applications
Applying Cryptography as a Service to Mobile Applications SESSION ID: CSV-F02 Peter Robinson Senior Engineering Manager RSA, The Security Division of EMC Introduction This presentation proposes a Cryptography
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
UNCLASSIFIED Version 1.0 May 2012
Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
Egress Switch Best Practice Security Guide V4.x
Egress Switch Best Practice Security Guide V4.x www.egress.com 2007-2013 Egress Software Technologies Ltd Table of Contents Introduction... 4 Best Practice Installation... 4 System Administrators... 5
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats
WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top
Best Practices for SIP Security
Best Practices for SIP Security IMTC SIP Parity Group Version 21 November 9, 2011 Table of Contents 1. Overview... 33 2. Security Profile... 33 3. Authentication & Identity Protection... 33 4. Protecting
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
Courtesy Translation
Direction centrale de la sécurité des systèmes d information Protection Profile Electronic Signature Creation Application Date : July 17th, 2008 Reference : Version : 1.6 Courtesy Translation Courtesy
Policy Document. Communications and Operation Management Policy
Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author
Thick Client Application Security
Thick Client Application Security Arindam Mandal ([email protected]) (http://www.paladion.net) January 2005 This paper discusses the critical vulnerabilities and corresponding risks in a two
05.0 Application Development
Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
WEB SERVICES SECURITY
WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Ciphire Mail. Abstract
Ciphire Mail Technical Introduction Abstract Ciphire Mail is cryptographic software providing email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the
Technical Standards for Information Security Measures for the Central Government Computer Systems
Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...
EA-ISP-012-Network Management Policy
Technology & Information Services EA-ISP-012-Network Management Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 01/04/2015 Document Security Level: PUBLIC Document Version: 1.00 Document Ref:
Service Definition Document
Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)
Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080
Test Cases Document VOIP SOFT PBX Project Code: SPBX Project Advisor : Aftab Alam Project Team: Umair Ashraf 03-1853 (Team Lead) Imran Bashir 02-1658 Khadija Akram 04-0080 Submission Date:23-11-2007 SPBX
Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide
Third Party Identity Services Assurance Framework Information Security Registered Assessors Program Guide Version 2.0 December 2015 Digital Transformation Office Commonwealth of Australia 2015 This work
USB Portable Storage Device: Security Problem Definition Summary
USB Portable Storage Device: Security Problem Definition Summary Introduction The USB Portable Storage Device (hereafter referred to as the device or the TOE ) is a portable storage device that provides
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
C015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
CRYPTOGRAPHY AS A SERVICE
CRYPTOGRAPHY AS A SERVICE Peter Robinson RSA, The Security Division of EMC Session ID: ADS R01 Session Classification: Advanced Introduction Deploying cryptographic keys to end points such as smart phones,
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
Chap. 1: Introduction
Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed
Integrating VoIP Phones and IP PBX s with VidyoGateway
Integrating VoIP Phones and IP PBX s with VidyoGateway Updated February 2011 INDEX: I. ABSTRACT.1 II. III. IV. VIDYOGATEWAY OVERVIEW.. 1 NETWORK TOPOLOGIES AND DEFINITIONS...2 CONNECTING TO VIDYOCONFERENCES
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Why you need secure email
Why you need secure email WHITE PAPER CONTENTS 1. Executive summary 2. How email works 3. Security threats to your email communications 4. Symmetric and asymmetric encryption 5. Securing your email with
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate thawte thawte thawte thawte thawte 10.
Securing your Microsoft Internet Information Services (MS IIS) Web Server with a thawte Digital Certificate A STEP-BY-STEP GUIDE to test, install and use a thawte Digital Certificate on your MS IIS Web
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide
OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server Quick Start Guide October 2013 Copyright and Legal Notice. All rights reserved. No part of this document may be
Security and the Mitel Teleworker Solution
Security and the Mitel Teleworker Solution White Paper July 2007 Copyright Copyright 2007 Mitel Networks Corporation. This document is unpublished and the following notice is affixed to protect Mitel Networks
HP PROTECTTOOLS EMAIL RELEASE MANAGER
HP PROTECTTOOLS EMAIL RELEASE MANAGER Business white paper HP ProtectTools Email Release Manager provides enhancements to the Microsoft Exchange and Outlook clients. HP has developed HP ProtectTools Email
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller. July 24, 2015 Version 1
Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller July 24, 2015 Version 1 1 Table of Contents 1 Introduction... 4 1.1 Conformance Claims...4 1.2 How to
DOMAIN NAME SECURITY EXTENSIONS
DOMAIN NAME SECURITY EXTENSIONS The aim of this paper is to provide information with regards to the current status of Domain Name System (DNS) and its evolution into Domain Name System Security Extensions
PENTEST. Pentest Services. VoIP & Web. www.novacybersecurity.com
PENTEST VoIP & Web Pentest Services VoIP & WEB Penetration Testing The Experinced and National VoIP/Unified Communications R&D organization, NETAŞ NOVA Pentest Services test the applications, infrastructure
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Standard Information Communications Technology. Videoconferencing. January2013 Version 1.4. Department of Corporate and Information Services
Standard Information Communications Technology January2013 Version 1.4 Corporate and Information Services Document details Document Title Contact details File name Version 1.4 Document Control Information
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY Firewall Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator: Recommended by Director
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
