VoIP Security Project: SCAP Applicability Work Group. www.isalliance.org



Similar documents
Application of SCAP to Secure Unified Communications.

The Internet Security Alliance

Applicability of the Security Control Automation Protocol (SCAP) to Voice over Internet Protocol (VoIP) Systems Version 0.9

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

How To Use A Policy Auditor (Macafee) To Check For Security Issues

BMC Client Management - SCAP Implementation Statement. Version 12.0

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Automating Compliance with Security Content Automation Protocol

Federal Desktop Core Configuration (FDCC)

FDCC & SCAP Content Challenges. Kent Landfield Director, Risk and Compliance Security Research McAfee Labs

SIP Trunking with Microsoft Office Communication Server 2007 R2

Recommended IP Telephony Architecture

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

STIGs,, SCAP and Data Metrics

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Security Orchestration with IF-MAP

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

Securing SIP Trunks APPLICATION NOTE.

Continuous Monitoring

Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Security compliance automation with Red Hat Satellite

SIP Trunking Configuration with

Mitigating the Security Risks of Unified Communications

Cisco Advanced Services for Network Security

Computer Network Engineering

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

CCNA Cisco Associate- Level Certifications

Session Border Controllers in Enterprise

Microsoft Technologies

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

SIP Trunking. Cisco Press. Christina Hattingh Darryl Sladden ATM Zakaria Swapan. 800 East 96th Street Indianapolis, IN 46240

Multi-layered Security Solutions for VoIP Protection

PETER CUTLER SCOTT PAGE. November 15, 2011

Applying the Continuous Monitoring Technical Reference Model to the Asset, Configuration, and Vulnerability Management Domains (DRAFT)

Chapter 1 The Principles of Auditing 1

Convergence: The Foundation for Unified Communications

Build the Best UC&C Network for an Optimized Microsoft Lync Deployment

Network Security Topologies. Chapter 11

Firewall Security. Presented by: Daminda Perera

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

SESSION 706 Wednesday, November 4, 9:00am - 10:00am Track: Framework Fusion

Information Security Office

Voice over IP Communications

Transparent weaknesses in VoIP

Computer Network Engineering

Unified Threat Management, Managed Security, and the Cloud Services Model

An Enterprise Continuous Monitoring Technical Reference Architecture

Sygate Secure Enterprise and Alcatel

VoIP Resilience and Security Jim Credland

Security Guidance for Deploying IP Telephony Systems

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

SITEL Voice Architecture

Security Coordination with IF-MAP

CDM Vulnerability Management (VUL) Capability

Cisco Certified Network Associate (CCNA) Cisco Certified Network Associate (CCNA)

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Edgewater Routers User Guide

Penetration Testing Guidelines For the Financial Industry in Singapore. 31 July 2015

Introducing Cisco Hosted Unified Communications Services

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Level: 3 Credit value: 9 GLH: 80. QCF unit reference R/507/8351. This unit has 6 learning outcomes.

Live Communications Server 2005 SP1 Office Communications Server Matt Newton Network Engineer MicroMenders, Inc

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

How To Make A Cell Phone Converged Into A Cell Network

Enterprise Phone Systems. The Complete Buyer s Guide

UC and SIP Trunking Luncheon. Sponsored by:

Voice Over IP (VoIP) Denial of Service (DoS)

White Paper. avaya.com 1. Table of Contents. Starting Points

Edgewater Routers User Guide

OVAL Developer Days. July 11-12, 2006

Using CMMI Effectively for Small Business Panel

ZyXEL V100 Support Notes. ZyXEL V100. (V100 Softphone 1 Runtime License) Support Notes

Using Cisco UC320W with Windows Small Business Server

VPLS lies at the heart of our Next Generation Network approach to creating converged, simplified WANs.

Security Threat Risk Assessment: the final key piece of the PIA puzzle

KISUMU LAW COURTS: SPECIFICATIONS FOR A UNIFIED COMMUNICATION SYSTEM / VOICE OVER INTERNET PROTOCOL (VOIP) SOLUTION. Page 54 of 60

ICANWK406A Install, configure and test network security

SIP and VoIP 1 / 44. SIP and VoIP

D. Best Practices D.2. Administration The 6 th A

OfficeMaster Gate (Virtual) Enterprise Session Border Controller for Microsoft Lync Server. Quick Start Guide

Secure Voice over IP (VoIP) Networks

Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing

Transcription:

VoIP Security Project: SCAP Applicability Work Group

Outline Introductions The Challenge Working Group Process Applicability of the SCAP Standards Future Needs Q&A

Applicability Participants Chair of the Applicability Group Paul Sand, Salare Security AJ West, Boeing Alex Fielding, Ripcord Networks Allie Larman, Oklahoma Office of State Finance Andrew Bove, Secure Acuity Networks, LLC Andriy Markov, VoIPshield Systems Inc. Barry Wasser, Department of Homeland Security Blake Frantz, Center For Internet Security Bob Moskowitz, ICSAlabs, an Independent Division of Verizon Business Systems Bogdan Materna, VoIPshield Systems Inc. Calvin Bowditch, Joint Task Force-Global Network Operations Carl Herberger, Evolve IP Cheri Sigmon, Department of Defense Cynthia Reese, Science Applications International Corporation (SAIC) David Lukasik, Department of Veterans Affairs Dawn Adams, EWA-Canada Denise Walker, DBA, Lone Star College System Ed Stull, Direct Computer Resources Ed White, McAfee Edward Cummins, Raytheon Gary Gapinski, National Aeronautics and Space Administration Imran Khan, Consultant James Mesta, Agilent Technologies, Inc. Jeffrey Ritter, Waters Edge Consulting Jim Meyer, Institute for Defense Analyses John Fulater, HSBC North America Joseph Dalessandro, Withheld Ken Fee, Firefly Communications Ken Stavinoha, Microsoft Kenneth Kousky, Salare Security, LLC Kevin Watkins, McAfee Laurie Hestor, Defense Information Systems Agency Linda Kostic, etrade Financial Lorelei Knight, ICSAlabs, an Independent Division of Verizon Business Systems Lynn Hitchcock, Raytheon Mark Humphrey, Boeing Matt Trainor, Nortel Networks Paul Salva, HSBC North America Pete Eisele, Northrop Grumman Peter Thermos, Palindrome Technologies Rick Mellendick, Food and Drug Administration Robert Smith, Global UniDocs Company Ronald Rice, Defense Information Systems Agency Scott Armstrong, Gideon Technologies Shawn Dickson, Raytheon Sheila Christman, National Security Agency Steve Carver, FAA (Retired) Steven Draper, National Security Agency Terry Rimmer, Oklahoma Office of State Finance Tom Grill, VeriSign

Special Thanks AJ West, Boeing Andriy Markov, VoIPshield Systems Inc. Barry Wasser, DHS Bogdan Materna, VoIPshield Systems Inc. Dawn Adams, EWA-Canada Ed Cummins, Raytheon Gary Gapinski, NASA John Fulater, HSBC North America Ken Stavinoha, Microsoft Leighton Johnson, ISFMT Paul Salva, HSBC North America Peter Thermos, Palindrome Technologies Rick Mellendick, FDA Terry Rimmer, Oklahoma Office of State Finance Andrew Bove, Secure Acuity Networks, LLC Barry Archer, American Century Investments Bob Moskowitz, ICSAlabs David Lukasik, Dept of Veterans Affairs Denise Walker, DBA, Lone Star College Sys. Ed White, McAfee Joe Grettenberger, Compliance Collaborators Ken Kousky, IP3, Inc. Kevin Watkins, McAfee Matt Trainor, Nortel Networks Pete Eisele, Northrop Grumman Richard Austin, Kennesaw State University Ronald Rice, DISA Tom Grill, VeriSign

The Unified Communications Challenge Networks Services UC Network Devices

The SCAP Challenge SCAP Today Federal Desktop Core Configuration (FDCC) One Vendor Just Desktops Just Evaluation SCAP Tomorrow Set Configuration More Applications More Vendors More Tools

Applicability Workgroup Approach Scope Architecture Applicability of SCAP TRA (Threat Risk Assessment) Security Controls

Scope of Phase I Effort Management Virtual Local Area Network (VLAN s) and virtual private network (VPN s) Signaling Session Initiation Protocol (SIP/SIPS) Media Secure Real-time Transport Protocol (RTP/SRTP) [requires industry adoption] Network Routers, Switches, firewalls, VPNs, VLANs Traditional Voice Services Interconnection Features Voice Calls User Devices IP Phones, Soft phones The Traffic Planes Management Signaling/Control Media

VoIP Architecture Legend Time-division multiplexing (TDM) Public switched telephone network (PSTN) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Network Time Protocol (NTP) Implicit dynamically secured application protocols (IDSAP) Application-level gateway (ALG) Network address translation (NAT) Intrusion detection system (IDS) Intrusion prevention system (IPS)

VoIP Mini-TRA: Assets System Asset Informational Asset Importance Of Security Requirement Confidentiality Integrity Availability IP Phone Handset Operating System Low Moderate Moderate Configuration Low - Moderate Moderate Moderate Media Moderate Moderate Critical Signaling Moderate Critical Critical Management Critical Critical Critical Desktop Operating System Low Moderate Moderate VoIP Application (i.e., Soft phone) Low Moderate Moderate Media Moderate Moderate Critical Signaling Moderate Critical Critical Management Critical Critical Critical Importance of security requirements listed are subjective and based on the requirements of the enterprise

VoIP Mini-TRA: Threat Sources & Likelihood Threat Sources Malicious or Accidental Users Threat Likelihood Based on Access Vector Internal Network External / Internet External / PSTN Likely Likely Possible Configuration weaknesses Likely Likely Possible Hardware flaws Likely Possible Unlikely Software flaws Likely Likely Unlikely Physical Interruptions Likely Possible Unlikely

VoIP Mini-TRA: Threat Risk Score System Asset Informational Asset Threat Impact Threat Likelihood Risk IP Phone Handset Operating System Low Medium Minor Configuration Low High Major Media Low Low Minor Signaling Low Low Minor Management Low Medium Minor Desktop Operating System Low High Major VoIP Application (i.e., Soft phone) Low High Major Media Low Low Minor Signaling Low Low Minor Management Low Medium Minor

VoIP Security Controls: SP 800-53 Call Controller to IP Phones Call Controller Subsystem Security Function SP 800-53 R3 Control Low Moderate High Location discovery (DNS) SC-20 SC-20 (1) SC-20 (1) SC-20 (1) SC-21 SC-21 Not selected Not selected SC-21 Signaling session establishment and termination management SC-8 SC-9 SC-8 Not Selected SC-9 Not Selected SC-8 (1) SC-8 (1) SC-9 (1) SC-9 (1) SC-10 SC-10 Not Selected SC-10 SC-10 SC-23 SC-23 Not Selected SC-23 SC-23

Applying SCAP to VoIP Standard Description Assessment XCCDF OVAL CVE Extensible Configuration Checklist Description Format Open Vulnerability and Assessment Language Common Vulnerabilities and Exposures OK Need More Device Support Need More OS Support Need More Expressiveness OK

Applying SCAP to VoIP Standard Description Assessment CCE CPE CVSS Common Configuration Enumeration Common Platform Enumeration Common Vulnerability Scoring System No Configurations for VoIP Elements No VoIP Element Definitions OK

Other SCAP Improvements Need Multiple Classification Zones Need System View

Other Critical Success Factors Need Major VoIP Vendor Involvement Need SCAP Business Case Increased Collaboration/Sharing of Checklist Information (NCP)

Phase II ISA & NIST to Lead Effort Encouraging Vendor Participation Comprehensive Reference Architecture More VoIP Features Voice Mail Conferencing Instant Messaging Identity Management Video Encryption/Decryption

Request the White Paper Please email bfoer@isalliance.org to request a free copy of Application of SCAP to Secure Unified Communications

Q&A