Application of SCAP to Secure Unified Communications. www.isalliance.org



Similar documents
VoIP Security Project: SCAP Applicability Work Group.

The Internet Security Alliance

Applicability of the Security Control Automation Protocol (SCAP) to Voice over Internet Protocol (VoIP) Systems Version 0.9

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Transparent weaknesses in VoIP

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

IP Phone Baseline Security Checklist

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER Agency Administrative Order Series. Secure Baseline Attachment

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

NIST Cyber Security Activities

Recommended IP Telephony Architecture

Basics of Internet Security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Securing VoIP Networks using graded Protection Levels

CTS2134 Introduction to Networking. Module Network Security

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

A Model-based Methodology for Developing Secure VoIP Systems

BMC s Security Strategy for ITSM in the SaaS Environment

Network Security Administrator

Central Agency for Information Technology

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

ITL BULLETIN FOR JANUARY 2011

Vulnerabilities in SOHO VoIP Gateways

Bellevue University Cybersecurity Programs & Courses

Cisco Advanced Services for Network Security

7. Public Key Cryptosystems and Digital Signatures, 8. Firewalls, 9. Intrusion detection systems, 10. Biometric Security Systems, 11.

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Compliance Risk Management IT Governance Assurance

Securing the Service Desk in the Cloud

CNA 432/532 OSI Layers Security

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Cryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.

TLS and SRTP for Skype Connect. Technical Datasheet

ORDER National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:

Introduction to Security

Securing Data on Microsoft SQL Server 2012

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Curran, K. Tutorials. Independent study (including assessment) N/A

Security Orchestration with IF-MAP

VOICE OVER IP SECURITY

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

FREQUENTLY ASKED QUESTIONS

Recommendations for Provisioning Security

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

IP Telephony Management

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Secure SCADA Network Technology and Methods

MS-55096: Securing Data on Microsoft SQL Server 2012

SIP Trunking with Microsoft Office Communication Server 2007 R2

FAST FILE TRANSFER INFORMATION ASSURANCE ASSESSMENT REPORT

COSC 472 Network Security

Information Security. Rick Aldrich, JD, CISSP Booz Allen Hamilton

INTRUSION PREVENTION (IPS) Features SECURITY OF INFORMATION TECHNOLOGIES

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Managed Security Services for Data

Society, Law Enforcement and the Internet

2) trusted network, resilient against large scale Denial of Service attacks

Information Security Basic Concepts

IT Networking and Security

Human Factors in Information Security

GE Measurement & Control. Cyber Security for NEI 08-09

NATIONAL SECURITY AGENCY Ft. George G. Meade, MD

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

SIP Trunking Interoperability

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Building Robust Security Solutions Using Layering And Independence

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

IINS Implementing Cisco Network Security 3.0 (IINS)

Chapter 1 The Principles of Auditing 1

Principles of Information Assurance Syllabus

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

Cloud security architecture

MySQL Security: Best Practices

SIP and VoIP 1 / 44. SIP and VoIP

Cisco Intercloud Fabric Security Features: Technical Overview

Skoot Secure File Transfer

Update On Smart Grid Cyber Security

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Secure networks are crucial for IT systems and their

Fundamentals of Network Security - Theory and Practice-

Network Access Control and Cloud Security

Transcription:

Application of SCAP to Secure Unified Communications

Participants Co-Chairs of the Baseline Standards Group Mark Humphrey, Boeing and Scott Armstrong, Gideon Technologies AJ West, Boeing Alex Fielding, Ripcord Networks Allie Larman, Oklahoma Office of State Finance Andrew Bove, Secure Acuity Networks, LLC Andriy Markov, VoIPshield Systems Inc. Barry Archer, American Century Investments Barry Wasser, Department of Homeland Security Blake Frantz, Center For Internet Security Bob Moskowitz, ICSAlabs, an Independent Division of Verizon Business Systems Bogdan Materna, VoIPshield Systems Inc. Calvin Bowditch, Joint Task Force-Global Network Operations Carl Herberger, Evolve IP Chad Lorenc, Agilent Technologies, Inc. Cheri Sigmon, Department of Defense Dawn Adams, EWA-Canada Denise Walker, DBA, Lone Star College System Ed White, McAfee Edward Cummins, Raytheon Faisal Naqvi, Expedia Gary Humphrey, AT&T Greg Pulos, Department of Commerce Imran Khan, Consultant James Mesta, Agilent Technologies, Inc. Jeff Pound, US Department of Transportation Jeffrey Ritter, Waters Edge Consulting Jim Meyer, Institute for Defense Analyses Joe Grettenberger, Compliance Collaborators, Inc. John Poff, Pearl Technology John Fulater, HSBC North America John Wurzler, CNA Insurance Kathleen Blasco, Department of Homeland Security Ken Fee, Firefly Communications Ken Stavinoha, Microsoft Kenneth Kousky, Salare Security, LLC Kevin Watkins, McAfee Leighton Johnson, Information Security and Forensics Management Team Linda Kostic, etrade Financial Lorelei Knight, ICSAlabs, an Independent Division of Verizon Business Systems Lynn Hitchcock, Raytheon Martha Soles, US-CERT Matt Trainor, Nortel Networks Michael Hamilton, City of Seattle Paul Salva, HSBC North America Pete Eisele, Northrop Grumman Richard Austin, Kennesaw State University Rick Mellendick, Food and Drug Administration Robert Kennedy, Disney Robert Smith, Global UniDocs Company Ronald Rice, Defense Information Systems Agency Shawn Dickson, Raytheon Sheila Christman, National Security Agency Steve Carver, FAA (Retired) Steven Bennett, Jones Day Steven Draper, National Security Agency Terry Rimmer, Oklahoma Office of State Finance Tom Grill, VeriSign

Special Thanks AJ West, Boeing Andriy Markov, VoIPshield Systems Inc. Barry Wasser, DHS Bogdan Materna, VoIPshield Systems Inc. Dawn Adams, EWA-Canada Ed Cummins, Raytheon Gary Gapinski, NASA John Fulater, HSBC North America Ken Stavinoha, Microsoft Leighton Johnson, ISFMT Paul Salva, HSBC North America Peter Thermos, Palindrome Technologies Rick Mellendick, FDA Terry Rimmer, Oklahoma Office of State Finance Andrew Bove, Secure Acuity Networks, LLC Barry Archer, American Century Investments Bob Moskowitz, ICSAlabs David Lukasik, Dept of Veterans Affairs Denise Walker, DBA, Lone Star College Sys. Ed White, McAfee Joe Grettenberger, Compliance Collaborators Ken Kousky, IP3, Inc. Kevin Watkins, McAfee Matt Trainor, Nortel Networks Pete Eisele, Northrop Grumman Richard Austin, Kennesaw State University Ronald Rice, DISA Tom Grill, VeriSign

Scope Baseline Standards Process Recommended Architecture Security Controls Review Standards Define Baseline

Defined Areas Phone Security Overview - Hypertext Transfer Protocol Secure (HTTPS) Using the Certificate Authority Proxy Function Encrypting Phone Configuration Files Configuring Digest & Phone Hardening Call Controller Hardening Firewalls and Intrusion Prevention Systems (IPS) Security at Different Planes and Other Relevant Controls Signaling and Media Protection Mechanisms

Basis for SCAP Why SCAP? VoIP Community Today Distinct Groups and Perspectives Common Carrier Vendors Enterprise/ Business

Basis for SCAP Key Resources DraftTelecommunication Standardization Sector (ITU-T) Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications Internet Protocol Telephony & Voice Over Internet Protocol Security Technical Implementation Guide Version 2, Release 2 Alliance for Telecommunications Industry Solutions (ATIS) -1000007.2006 - Generic Signaling and Control Plane Security Requirements for Evolving Networks Federal Information Security Management Act (FISMA). NIST SP 800-32, Introduction to Public Key Technology and the Federal PKI Infrastructure, Security Guidance for Deploying IP Telephony Systems. http:///images/stories/i332-016r-2005.pdf Defence Information Systems Agency (DISA) Security Technical Implementation Guides.

Basis for SCAP Key Resources (Cont.) Federal Information Processing Standards (FIPS) PUB 140-2, Security Requirements for Cryptographic Modules NIST SP 800-53 Rev. 3, Recommended Security Controls for Federal Information Systems Jonathan Rosenberg, et. al., SIP: Session Initiation Protocol Internet Engineering Task Force (IETF) Request for Comments (RFC) 3261. Peter Thermos, Ari Takanen, Securing VoIP Networks; Threats, Vulnerabilities and Countermeasures, Addison-Wesley 2007, ISBN:978-0321437341 S. Kent, K. Seo, Security Architecture for the Internet Protocol, RFC 4301, December 2005

Strategy Configurations and Compliance Testing Minimum Baseline Controls Security Considerations Defense in Breadth Defense in Depth Automated Processes

Phone Security Overview Match Baseline to Organization s needs Appropriate Assurance Level Flexible Adaptable Currently Available Solution Adequate Service Continuity (Switched Network Equivalent)

Certificate Authority Proxy Function Enable Certificates and Public Key Infrastructure (PKI) Identity Management Confidentiality Integrity Availability

Encrypting Phone Configuration Files Encryption/Decryption Process Security Controls Symmetric Encryption Algorithms Asymmetric Encryption Algorithms Key Management Security Considerations Public Key Infrastructure (PKI) Key Management Infrastructure (KMI) Trivial File Transfer Protocol (TFTP) Passwords

Digest Authentication Users-to-Proxy Proxy- to-proxy Proxy-to-Server Phone Hardening Baseline Standards Configuring Digest Phone Hardening Device Update Assurance Data-at-Rest (minimize Attack surface) Data-in-Transit (CIA)

Call Controller Hardening Minimize Attack Surface Delete Unnecessary Services & Utilities Enable Incident Management Detection Analysis Response

Firewalls and IPS Segment & Isolate Infrastructure Pass Allowed Traffic Block Attacks Monitor and Manage Network Network & Situational Awareness Audit and Accountability

Security at Different Planes & Other Relevant Controls Management Plane Signaling Plane Media/Control Media Plane Attack Vectors and Exposures MITM, Replay, Impersonation, TFTP..

Request the White Paper Please email bfoer@isalliance.org to request a free copy of Application of SCAP to Secure Unified Communications

Questions?

Technology Changed VoIP Quickly Adopted Commercial Market Government Baseline Standards Phone Security Overview Regulation and Legal Issue Also Following ISAlliance Leading Effort to Assist Definition Others