Multi-layered Security Solutions for VoIP Protection



Similar documents
VoIP: The Evolving Solution and the Evolving Threat. Copyright 2004 Internet Security Systems, Inc. All rights reserved worldwide

Cisco Advanced Services for Network Security

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

A Strategic Approach to Protecting SCADA and Process Control Systems

The Evolution of Managed Security Services ISS Virtual-SOC Solution, Security the Way You Need It

Securing SIP Trunks APPLICATION NOTE.

Recommended IP Telephony Architecture

Voice Over IP (VoIP) Denial of Service (DoS)

VOICE OVER IP SECURITY

Threat Mitigation for VoIP

Secure VoIP for optimal business communication

Security issues in Voice over IP: A Review

Solution Brief. Secure and Assured Networking for Financial Services

Best Practices for Securing IP Telephony

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

VOIP Security Essentials. Jeff Waldron

Security and the Mitel Teleworker Solution

Voice Over IP and Firewalls

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Security and Risk Analysis of VoIP Networks

VoIP Security, an overview of the Threat Landscape

Basics of Internet Security

Voice and Data Convergence

10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

Sygate Secure Enterprise and Alcatel

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

White Paper. avaya.com 1. Table of Contents. Starting Points

Securing VoIP Networks using graded Protection Levels

TSC (Total Solution Communications Ltd)

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

IP Telephony Basics. Part of The Technology Overview Series for Small and Medium Businesses

An Oracle White Paper February Centralized vs. Distributed SIP Trunking: Making an Informed Decision

Avaya IP Office. Converged Communications. Contact Centres Unified Communication Services

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Contents Introduction Why Fax over IP? How Real-time Fax over IP works Implementation with MessagePlus/Open Summary. About this document

Mitigating the Security Risks of Unified Communications

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

What is an E-SBC? WHITE PAPER

The Truth about False Positives

VOIP THE ULTIMATE GUIDE VERSION /23/2014 onevoiceinc.com

ICTTEN5168A Design and implement an enterprise voice over internet protocol and a unified communications network

IBM Security Intrusion Prevention Solutions

Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs

Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services

Providing Secure IT Management & Partnering Solution for Bendigo South East College

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Secure Voice over IP (VoIP) Networks

Security & Reliability in VoIP Solution

Session Border Controllers in Enterprise

ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS

Ingate Firewall/SIParator SIP Security for the Enterprise

VoIP Time to Make the Call? Abstract

Succession Solutions. Voice over IP enabled Meridian

Securing Unified Communications for Healthcare

VOIP SECURITY ISSUES AND RECOMMENDATIONS

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

VoIP Security Methodology and Results. NGS Software Ltd

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Configuring a Mediatrix 500 / 600 Enterprise SIP Trunk SBC June 28, 2011

Cisco Virtual Office Unified Contact Center Architecture

An outline of the security threats that face SIP based VoIP and other real-time applications

IBM Internet Security Systems

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

White paper. TrusGuard DPX: Complete Protection against Evolving DDoS Threats. AhnLab, Inc.

Deploying Firewalls Throughout Your Organization

Convergence: The Foundation for Unified Communications

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

Connecting MPLS Voice VPNs Enabling the Secure Interconnection of Inter-Enterprise VoIP

Is Your Network Ready for VoIP?

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

Oracle s Session Initiation Protocol Trunking Solution. Increase Agility and Reduce Costs with Session Initiation Protocol Trunks

The Cisco ASA 5500 as a Superior Firewall Solution

Voice over IP Networks: Ensuring quality through proactive link management

Managed Security Services for Data

Contents. Specialty Answering Service. All rights reserved.

Building a better branch office.

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Transcription:

Multi-layered Security Solutions for VoIP Protection Copyright 2005 internet Security Systems, Inc. All rights reserved worldwide

Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 1 INTRODUCTION The Benefits of VoIP Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the Public Switched Telephone Network (PSTN). As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons. Consolidation of voice and data on one network reduces costs and results in a lower network total cost of ownership (TCO). Operating expense savings include lower long distance charges, reduced support costs and savings via workforce virtualization. Companies also use the migration to VoIP as an opportunity to replace aging telephony equipment with feature-rich technology like teleconferencing and collaboration/multimedia applications. VoIP supports increased mobility, since remote workers have the same access to voice features as corporate office employees. Research organization Gartner Inc. recently reported that spending by US companies and public-sector organizations on VoIP systems is on track to grow to $903 million in 2005 (up from the $686 million in 2004). By 2007, Gartner expects 97 percent of new phone systems installed in North America to be VoIP or hybrids 1. Planning and Implementing VoIP Security While it is true that Voice over IP can provide savings over traditional telephony solutions, there are security risks associated with this technology that need to be addressed. Risks include denial of service (), service theft, unauthorized call monitoring, call routing manipulation, identity theft and impersonation, among others. Not only does VoIP inherit all data network security risks, but it introduces new vectors for threats related to the emerging and untested technology and protocols associated with VoIP. These new threat vectors in turn increase the risk to the data network. Companies may spend $100,000 or more on network upgrades required to support a VoIP implementation, yet they may overlook VoIP security during their network assessment. Many enterprises assume that their existing security policies are adequate. And in many cases, executives do not include security managers in the decision-making process (either for purchase or deployment of VoIP). The technology behind VoIP is a complex collection of protocols, applications and appliances that all require attention when planning a new implementation or conducting risk assessments of existing technology. An ideal VoIP security solution provides multi-layered, preemptive protection from threats affecting both traditional data-driven network traffic and the underlying infrastructure, devices and protocols that support VoIP data transmissions, all without interrupting Quality of Service. 1. http://blogs.zdnet.com/itfacts/index.php?id=p2656 (February 22, 2005).

Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 2 ISSUES ASSOCIATED WITH VoIP SECURITY The biggest threats associated with VoIP are service disruption or degradation () and remote compromise that can lead to unfettered access to an enterprise's critical systems and the confidential information stored on those systems. Attack prevention and the preservation of Quality of Service are the key requirements for a VoIP protection system. Quality of Service (QoS) VoIP requires higher standards of Quality of Service and availability than are accepted on worldwide data networks. The degree of latency that may be acceptable for data traffic cannot be tolerated for voice transmissions. Any threat that disrupts service, even slightly, or compromises call integrity could result in a service outage. Executives contemplating or undergoing the switch to VoIP need to consider how an outage might impact their business. A prime example of VoIP risk is a business call center undergoing a denial of service attack. The lines would be flooded; no calls could get through. The cost of network cleanup and recovery may be substantial, but that pales in comparison to the cost of lost business opportunities while the network is down. Fortune magazine data shows that Fortune 1000 companies earn revenues per minute ranging from $9,000 to $258 million, with an average of $62,000 per minute 2. Such financial losses from VoIP network downtime are unrecoverable. Integrated VoIP technology assures Quality of Service through multiple devices including routers, VoIP-specific servers, the virtual private networks (VPNs) across which the traffic might travel, and third party products. Security solutions protecting the VoIP network should honor QoS and protect against Denial of Service in order to assure the network's quality and reliability. Exploitation of Vu l n e r a b i l i t i e s A security concern regarding VoIP technology is that all vulnerabilities inherent in IP networks will also affect VoIP on the converged network, presenting new risks to an enterprise's voice services. Vulnerabilities in the network infrastructure can affect the security and availability of the VoIP network. For example, products from certain switch and router makers have fatal flaws that could let hackers craft Denial of Service attacks to disrupt enterprise networks. VoIP systems are also vulnerable due to weaknesses in the operating systems on which the VoIP servers are running. In addition to these operating system and data network security risks, VoIP specific threats increase an organization's risk as the voice and data networks converge. Further security measures are needed to manage this added risk. 2. Source: Fortune magazine. For further discussion of this topic, refer to the Internet Security Systems white paper, Risk Management & Productivity - Addressing the Business Value of Security, http://documents.iss.net/whitepapers/business_value_of_security_whitepaper.pdf

Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 3 SECURITY BEST PRACTICES FOR VOIP PROTECTION Potentially, every component of a VoIP system may be vulnerable. These include the protocols, IP infrastructure (routers, switches), IP/PBXs (private branch exchanges), VoIP-specific servers, and individual phones or soft phones (a PC with a headset). Careful network design and deployment of the VoIP network coupled with the implementation of specific security technologies will ensure quality, reliability and security for VoIP traffic. Protection Technologies While standard network security policies and procedures such as encryption, access control and logical separation of the voice network do provide some protection for VoIP, these measures alone will not provide adequate attack prevention, given the potential for unauthorized access or attacks that easily bypass traditional security mechanisms. Further, protocol-specific vulnerabilities and flaws within the VoIP applications themselves may leave VoIP systems vulnerable to attack in the absence of a vendor-supplied patch. According to a Forrester Research study, It is up to companies to provide the added security measures required for IP [Telephony]: Don't assume that vendors will respond to each and every risk that appears with patches for installed products 3. Encryption for VoIP traffic offers some protection from eavesdropping and other call compromises. But it must be backed up with strong protections not only at the gateway but at the network and host as well. MINIMAL STEPS FOR SECURING VOIP NETWORKS: Separate voice and data on different logical networks (VLANs) Separate DHCP servers Use strong authentication and access control on the voice gateway system Incorporate VoIP-aware application layer gateways (ALGs) and firewalls Use IPsec or SSH for remote management A multi-layered security solution must provide attack prevention for the following: TCP/UDP based attacks, operating system vulnerability attacks, protocol flaws, device configuration flaws and VoIP application flaws. A robust solution should allow for deep packet inspection of the packet payload to recognize known attacks, anomalies or suspected attacks based on known vulnerabilities. 3. Resolving Security Risks for IP Telephony, by Elizabeth Herrell; Forrester Research, 2004.

Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 4 VULNERABLE VOIP COMPONENTS Vulnerable VoIP Components Threats against VoIP infrastructure VoIP Protection Technology Protocols (IP, H.323, SIP, SCCP) Network Infrastructure (Routers, Switches, Firewalls) Underlying OS (Windows, Linux, AIX) IP PBX / Management Server IP Phones Soft Phones Viruses Viruses Viruses NIPS Network Intrusion Prevention System HIPS Host Intrusion Prevention System Firewall Further details about VoIP vulnerability exploitation can be found in the ISS white paper, VoIP: The Evolving Solution and the Evolving Threat 4. 4. http://www.iss.net/support/documentation/whitepapers/

Multi-layered Security Solutions for VoIP Protection An ISS Whitepaper 5 INTERNET SECURITY SYSTEMS' (ISS) MULTI-LAYERED VOIP SECURITY SOLUTION The ISS Proventia intrusion prevention solution is an essential element of a multi-layered VoIP security solution providing intrusion prevention at the gateway, on the network and at the host. Proventia products block threats that can bypass even a VoIP-aware firewall, and provide added protection to VLANs and VPNs dedicated to voice traffic. ISS' method of analyzing VoIP traffic differentiates its Voice over IP protection from other methods on the market. ISS' Proventia products parse and analyze the underlying VoIP family of protocols, including SIP, MGCP, H.323, SCCP and many others. Because Proventia intrusion prevention technology recognizes and parses these VoIP protocols, it is able to properly identify VoIP traffic and analyze the payload for known or suspected attacks. Proventia can recognize traffic that does not fit or follow the rules of the protocol and can alert administrators to anomalous traffic or block it outright. The use of protocol analysis techniques also means that when variant attacks are released, Proventia will still block them without needing a pattern matching signature update. By parsing and analyzing VoIP protocols and providing preemptive vulnerability protection via ISS' Virtual Patch technology, which preemptively protects vulnerable systems without a vendor-supplied patch, Proventia security products identify and protect an enterprise's VoIP systems against known and unknown threats-before they impact the network. The combination of ISS' Internet Scanner vulnerability assessment solutions and Proventia's Virtual Patch technology, powered by X-Force security intelligence, make vulnerability management on the voice network easy to maintain. CONCLUSION Many companies are migrating to IP telephony without fully investigating or understanding the security risks involved. VoIP is subject to all the risks and vulnerabilities that affect Internet data networks. In addition, there are several VoIP-specific vulnerabilities related to VoIP protocols and specific components of VoIP technology. Since VoIP has a lower tolerance for service disruption or degradation than would be acceptable on a data network, careful security planning is essential for maintaining availability and quality on a VoIP network. Enterprises must put in place a VoIP security solution that preserves Quality of Service by protecting against service disruption and provides protection against attacks that exploit VoIP-specific flaws and vulnerabilities and attacks against supporting operating systems and devices. A multi-layered security solution that includes intrusion prevention and preemptive shielding of vulnerabilities is essential to keep the voice network secure. VoIP vendors and standards bodies have the opportunity to make telephone communication more secure than even traditional PSTN, however, security is traditionally not a priority when new emerging technology is being developed. Even as vendors make security improvements over time, it is important for an enterprise to implement a complete, multi-layered security solution from a VoIP-aware security vendor to ensure its combined voice and data network is fully protected.

GLOBAL HEADQUARTERS 6303 Barfield Road Atlanta, GA 30328 United States Phone: (404) 236-2600 e-mail: sales@iss.net REGIONAL HEADQUARTERS Australia and New Zealand Internet Security Systems Pty Ltd. Level 6, 15 Astor Terrace Spring Hill Queensland 4000 Australia Phone: +61 (0)7 3838 1555 Fax: +61 (0)7 3832 4756 e-mail: aus-info@iss.net Asia Pacific Internet Security Systems K. K. JR Tokyu Meguro Bldg. 3-1-1 Kami-Osaki, Shinagawa-ku Tokyo 141-0021 Japan Phone: +81 (3) 5740-4050 Fax: +81 (3) 5487-0711 e-mail: jp-sales@iss.net Europe, Middle East and Africa Ringlaan 39 bus 5 1853 Strombeek-Bever Belgium Phone: +32 (2) 479 67 97 Fax: +32 (2) 479 75 18 e-mail: isseur@iss.net Latin America 6303 Barfield Road Atlanta, GA 30328 United States Phone: (404) 236-2709 Fax: (509) 756-5406 e-mail: isslatam@iss.net Copyright 2005 Internet Security Systems, Inc. All rights reserved worldwide. Internet Security Systems, Virtual Patch and Ahead of the Threat are trademarks, the Internet Security Systems logo, Proventia, Internet scanner and X-Force are registered trademarks of Internet Security Systems, Inc. Other marks and trade names mentioned are the property of their owners, as indicated. All marks are the property of their respective owner and used in an editorial context without intent of infringement. Specifications and content are subject to change without notice. Distribution: General PM-MLVOIPWP-0805 6303 BARFIELD ROAD l ATLANTA, GA 30328 l 800.776.2362 l FAX 1.404.236.2626