SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference



Similar documents
How To Use A Policy Auditor (Macafee) To Check For Security Issues

BMC Client Management - SCAP Implementation Statement. Version 12.0

Federal Desktop Core Configuration (FDCC)

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Automating Compliance with Security Content Automation Protocol

FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

VoIP Security Project: SCAP Applicability Work Group.

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Security compliance automation with Red Hat Satellite

STIGs,, SCAP and Data Metrics

Qualys PC/SCAP Auditor

How To Monitor Your Entire It Environment

An Approach to Vulnerability Management, Configuration Management, and Technical Policy Compliance

Continuous Monitoring

An Enterprise Continuous Monitoring Technical Reference Architecture

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

How To Improve Nasa'S Security

SAST, DAST and Vulnerability Assessments, = 4

Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

DoD Secure Configuration Management (SCM) Operational Use Cases

Recommended IP Telephony Architecture

CDM Vulnerability Management (VUL) Capability

IP Phone Baseline Security Checklist

CTS2134 Introduction to Networking. Module Network Security

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Presented by Evan Sylvester, CISSP

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER Agency Administrative Order Series. Secure Baseline Attachment

Towards security management in the cloud utilizing SECaaS

VRDA Vulnerability Response Decision Assistance

Scan Report Executive Summary. Part 2. Component Compliance Summary IP Address :

Guide to Enterprise Patch Management Technologies

EFFECTIVE VULNERABILITY SCANNING DEMYSTIFYING SCANNER OUTPUT DATA

Description of Actual State Sensor Types for the Software Asset Management (SWAM) Capability. 7 Jul 2014

Continuous Network Monitoring

Medical Device Security Health Group Digital Output

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Continuous security audit automation with Spacewalk, Puppet, Mcollective and SCAP

NEW!!! Industry s only Comprehensive VoIP Security Boot Camp

Total Protection for Compliance: Unified IT Policy Auditing

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Software Vulnerability Assessment

Applicability of the Security Control Automation Protocol (SCAP) to Voice over Internet Protocol (VoIP) Systems Version 0.9

Penetration Testing Report Client: Business Solutions June 15 th 2015

EAC Decision on Request for Interpretation (Operating System Configuration)

SCAP Compliance Checker Version 3.1 for Windows February 12, 2012

D. Best Practices D.2. Administration The 6 th A

SESSION 706 Wednesday, November 4, 9:00am - 10:00am Track: Framework Fusion

The Trivial Cisco IP Phones Compromise

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

April 11, (Revision 2)

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Symantec Control Compliance Suite Standards Manager

Belarc Advisor Security Benchmark Summary

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DryView 8150 Imager Release 1.0.

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Best Practices For Department Server and Enterprise System Checklist

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

QRadar SIEM 6.3 Datasheet

AppSentry Application and Database Security Auditing

Configuring the Edgewater 4550 for use with the Bluestone Hosted PBX

The Emergence of Security Business Intelligence: Risk

How To Get The Nist Report And Other Products For Free

Security Orchestration with IF-MAP

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Medical Image Manager (MIM) Version 6.1.

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Who is Watching You? Video Conferencing Security

Payment Card Industry (PCI) Executive Report 08/04/2014

Payment Card Industry (PCI) Executive Report 10/27/2015

NIST Cyber Security Activities

PENTEST. Pentest Services. VoIP & Web.

Turn-key Vulnerability Management

Vulnerability Management

9 Free Vulnerability Scanners + 1 Useful GPO Tool

Testing Control Systems

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Database Security & Auditing

Measurably reducing risk through collaboration, consensus & practical security management CIS Security Benchmarks 1

Protect Yourself Against VoIP Hacking. Mark D. Collier Chief Technology Officer SecureLogix Corporation

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Common Platform Enumeration (CPE) Technical Use Case Analysis

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

mbits Network Operations Centrec

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Transcription:

SCAP for VoIP Automating Configuration Compliance 6 th Annual IT Security Automation Conference

Presentation Overview 1. The Business Challenge 2. Securing Voice over IP Networks 3. The ISA VoIP Security Project 4. Next Steps With SCAP 5. Summary Slide 2.

The Business Challenge Cyber Security Operations: Expensive Prone to Failure 96% of Breaches Avoidable through Simple or Intermediate Controls Verizon 2010 Data Breach Report Cyber Security Industry is Caught in Too Busy to Get Better Trap I have additional risk to manage. I have capital budget. There are great new solutions. I don t have more people to manage them. Paraphrase of leading CISOs Slide 3.

VoIP Enterprise Risk Network convergence and channel consolidation potentially increase vulnerabilities and the consequences of failure in security. Dennis Blair, Former Director of National Intelligence, Feb. 2010 (paraphrase) Impact of Convergence Silo Approaches to Security Understood Cross-Silo Vulnerabilities and Attacks Ignored VLANs have vulnerabilities Impact of Channel Consolidation Voice Used as an Out-Of-Band Channel Voice Can be Used to Carry Data Slide 4.

Guidance NSA Security Guidance for IPT DISA VVoIP NIST SP 800-58 Best Practices from Vendors Security Devices SBC Firewall IPS/IDS VoIP Security Today Assessments & Controls Pen testing Monitoring New Vulnerabilities New Devices New Controls New Assessments Configuration Management Change Control Who has time? Slide 5.

FISMA and FDCC FISMA VoIP Coverage FIPS 199 and 200 Point to NIST SP-800 Series Implementation of SP-800-53 Controls Required for Compliance SP 800-58 Defines VoIP Controls FDCC does not Address VoIP SP-800-58 Recommends No Soft Phones Only covers Vista and XP OSs Slide 6.

ISA VoIP Charter ISA Mission ISA seeks to integrate advanced technology with business economics and effective public policy to create a sustainable system of cyber security. ISA VoIP Project Objective Increase cyber security posture and reduce operational expense through automated VoIP security configuration and compliance. Slide 7.

ISA VoIP Security Project Focus on automation of configuration management and compliance 2011 Objective IP PBX Call Manager Final Objective IP Phone Soft Phone IP PBX Call Manager Session Border Controller And more 2010 Objective IP Phone Soft Phone NIST SP 800-53, 800-70, 800-126, 800-58, NCP Slide 8.

Reference VoIP Network Slide 9.

Need To Automate IP Phone Configuration Compliance Widely Distributed New Access Vector Perimeter Security Not Sufficient Default Configuration Weak Will Drift from Baseline Changes to phone settings undetected Manual assessment not practical Convergence with Data Network At Least One Phone Will Be Altered! Slide 10.

Telnet / SSH HTTP / HTTPS SNMP Console Element Manager LLDP/CDP Typical Automation For Configuration Compliance Access Methods Vendor specific Inconsistency across data formats and mechanism Lack of open standards Incomplete retrieval of running configuration information / state May conflict with security best practices (i.e., disable protocol) Slide 11. Issues

SCAP For VoIP: Today SCAP Component Description Keyword VoIP Search Keyword Phone Search Common Vulnerability Enumeration (CVE) Standard nomenclature and dictionary of security related software flaws 96 matches 336 matches, out of which 102 (Apple iphone), 27 (Cisco), 7(Avaya), 6 (Nortel), 5 (Microsoft), 5 (Snom) Common Configuration Enumeration (CCE) Standard nomenclature and dictionary of software misconfigurations 0 (under development) 0 (under development) Common Platform Enumeration (CPE) Standard nomenclature and dictionary of product naming 22 matches (nortel and cisco) 146 matches Common Vulnerability Scoring System (CVSS) Standard for measuring the impact of vulnerabilities 0 0 extensible Checklist Configuration Description Format (XCCDF) Open Vulnerability and Assessment Language (OVAL) Standard XML for specifying checklists and for reporting results of checklist evaluation 0 0 Standard XML for test procedures 5 matches cisco (V) 16 matches - 13 (V), 3 (I) Slide 12.

SCAP For VoIP: Today Several CPE IDs available for IP phones Focus on software flaws / vulnerabilities (CVE) A few systems identify firmware version and do very basic penetration / vulnerability test No CCE IDs No Checklists for VoIP in NCP All configuration settings not accessible for SCAP Few OVAL test definitions available for VoIP No OVAL definitions for configuration compliance Much work remains to SCAP-enable VoIP Slide 13.

Status on the VoIP Security Project at ISA Focus: Configuration Compliance & Validation IP Phone is First to be Evaluated Baseline Security Configuration Checklist Done NIST 800-53 controls mapped to IP phone XCCDF document available In process to submit checklist to National Checklist Program for review Vendor Specific IP Phone Checklists Under Development Slide 14.

Assure Baseline Security Signaling Protocol: SIP Media Protocol: RTP/RTCP Configuration Controls For 7 Security Principles 3 Traffic Planes Automated and Manual Rules Expressed using XCCDF One size does not fit all IP Phone Baseline Security Checklist Slide 15.

Challenges With SCAP Enabling The IP Phone Perpetual Configuration Drift IP Phone Uses an Embedded OS Today s authenticated configuration scanners focus on Windows and Unix/Linux Retrieval of Entire Running State Not Available Use of remote access protocols varies between vendors No OVAL definition schema available for IP phone configuration compliance Slide 16.

Host Based Configuration Scanner Host based agent installed on the phone OVAL definition file to be downloaded to agent Gather, analyze configuration locally Generate and report results Pros Direct access to configuration Standard reporting format available with OVAL Cons Regular updates for IP phones across enterprise Resource consumption could impact call quality Slide 17.

Network Based Configuration Scanner Centralized platform probes IP phones for configurations No agent on phone Gather configuration from phone Analyze and generate report on centralized scanner Pros Eliminate need to update agent on all phones Cons Visibility of entire configuration questionable Lack of common data structure & remote access method Slide 18.

Hybrid Based Configuration Scanner Lightweight, host based agent installed on each phone Configuration gathered within each phone Centralized assessment platform to analyze/report results Pros Small memory (resource) footprint required for agent Eliminate need to update agent on all phones Direct access to configuration Extensive analysis and reporting available No significant impact to functionality and performance Cons None Slide 19.

Next Steps Automation Using OVAL Preliminary XCCDF content completed OVAL definitions for IP phone Apply OVAL compliance check to static phone configuration file stored on IPT server Ability to query entire configuration running state Apply OVAL compliance check to running state configuration on IP phone Report the results of the assessment Slide 20.

Industry Adoption Using SCAP to automate configuration compliance of IP phone is possible Vendor support is needed to make this a reality Develop specific product checklists based on an industry developed IP phone baseline checklist (i.e., ISA VoIP checklist). Develop an industry standard interface to query the entire running state of the phone configuration. Possibility of a standard data format structure for IP phone configuration Slide 21.

Summary Challenge today is VoIP configuration compliance rely on manual processes with limited operational resources Numerous VoIP security guidelines but no master list of all security requirements (i.e., IP phone checklist) focus on automation Adoption of standard based approach using SCAP is right tool to address VoIP configuration compliance challenge Configuration compliance must be a fundamental capability of an IP phone, not an optional nice-to-have feature NIST 800-70 review & National Checklist Program VoIP vendor involvement is critical Slide 22.

Contact Information Co-chair of ISA VoIP Project and Technical Director at VeriSign Thomas Grill (703) 948-3287 tgrill@verisign.com Co-chair of ISA VoIP Project and CEO of Salare Security Paul Sand (312) 994-2336 paul.sand@salaresecurity.com Slide 23.