VoIP Security Best Practices Bogdan Materna CTO & VP Engineering VoIPshield Systems Session: U3-03 04/02/2009.

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Copyright © 2007 Telcordia Technologies Challenges in Securing Converged Networks Prepared for : Telcordia Contact: John F. Kimmins Executive Director.
Voice Security Interop 2009 Mark D. Collier SecureLogix Corporation
SIP Trunking A VASP Perspective Thomas Roel Convergence Sales Engineer
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Addressing Security Issues IT Expo East Addressing Security Issues Unified Communications SIP Communications in a UC Environment.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Security Monitoring & Management Security Control Panel Sensors & Detection Devices $ $ $ $ $ $ Physical Security Monitoring.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
System and Network Security Practices COEN 351 E-Commerce Security.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 12 Network Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Firewall 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Security Posture Assessment (SPA) Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur,
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Deployment of the VoIP Servers BY: Syed khaja Najmuddin Ahmed Anil Kumar Marikukala.
Joel Maloff Phone.com February, 2012.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
VoIP Security Assessment Service Mark D. Collier Chief Technology Officer
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Presence Applications in the Real World Patrick Ferriter VP of Product Marketing.
October 10-13, 2006 San Diego Convention Center, San Diego California Taking IP Security to the Next Level Real-time threat mitigation.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
VoIP security : Not an Afterthought. OVERVIEW What is VoIP? Difference between PSTN and VoIP. Why VoIP? VoIP Security threats Security concerns Design.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Module 14: Configuring Server Security Compliance
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
© 2013 Avaya Inc. All rights reserved Avaya UC Collaboration Solution A complete solution for midsize companies Mobility Video SecurityNetworking.
Quintum Confidential and Proprietary 1 Quintum Technologies, Inc. Session Border Controller and VoIP Devices Behind Firewalls Tim Thornton, CTO.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Enterprise VoIP Security Threats  Agenda:  Introduction  Why worry?  What do we need to look at?  What have I seen in the past?  What can I do to.
Mario D’Silva National Technology Specialists Unified Communications UNC307.
Bridging Two Worlds Parting Is Such Sweet Sorrow: Adding IP Telephony to Existing "Big Iron" Mike Robinson CTO
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
ITExpo January 24, 2006 Networks C OGNITRONICS Network Media Servers Conferencing and Collaboration Mike Keefe CTO Presented by.
IS3220 Information Technology Infrastructure Security
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Living With Your New IP PBX David M. Laurenson, VP Information Technology and CIO A. Finkl & Sons A.Finkl & Sons founded in 1879 HQ in Chicago World’s.
SIP & How It Relates To YOUR Business. Jeff S. Olson Director of Marco Carrier Services David Bailey-Aldrich Technology.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
March 2009 Sipera Overview. 2 © 2009 Sipera Systems, Inc. All Rights Reserved. About Sipera  Leader in real-time Unified Communications (UC) security.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Critical Security Controls
Security Standard: “reasonable security”
IS4550 Security Policies and Implementation
Contact Center Security Strategies
Implementing Client Security on Windows 2000 and Windows XP Level 150
Ingate & Dialogic Technical Presentation
6. Application Software Security
In the attack index…what number is your Company?
Global One Communications
Presentation transcript:

VoIP Security Best Practices Bogdan Materna CTO & VP Engineering VoIPshield Systems Session: U /02/2009

VoIP Security Overview Voice over IP (VoIP) inherits the same security threats as the IP data network, plus some new ones Traditional IT security products are not equipped to address the new challenges associated with securing voice systems 3

Follows the data networks security history but VoIP is different than traditional data security: VoIP is a real-time, mission-critical service Voice-specific malicious activities VoIP presents new vectors of attack Applications (existing H/W and new S/W based vendors) Devices (wireline and wireless) Protocols (standard and proprietary) Still in the early stages – a few known incidents, more unpublished cases Research a cornerstone of VoIP and UC security Vulnerabilities, threats, exploits Signatures Zero day Current State of VoIP Security 4

Typical Enterprise PBX Deployment Call Manager Gateway Soft Clients Corporate Data Network Hard Phones IP Trunk Switch PSTN Trunk Access and Trunk Traffic One physical interface (1 Gbit/sec) supports both access and trunking traffic In large installation an additional physical interface might be used to provide dedicated IP trunking 5

VoIP based Call Center ACD PBX Call Recorder Web Application Servers (HTML, VXML, , and Chat) CTI & Reporting Server CRM Customer Internet PSTN Voice Mail Confidential information usage, maintenance, collection Customer IVR Agents Softphone Confidential information transmission Confidential information is collected, stored and transmitted through VoIP infrastructure Complex call flows, infrastructure and outsourcing creates potential for security breaches Large call volumes 6

Software related (introduced by a VoIP vendor) Configuration related (introduced by the user of VoIP) Protocol related (inherent protocol issues – SIP, UNIStim, Skinny, H323) Composite (combination of the above) Device level (related to a particular device/application such as IP PBX) System level (related to the VoIP infrastructure components and topology) Unidirectional or duplex (related to flow of data and information) 7 VoIP Vulnerabilities and Exploits

VoIP Protocol Layer VoIP Application Layer (Call Manager, PBX, Voice Mail, gateway, softphone…) Singling Protocols (Unistim, Skinny, SIP, …) Transport Protocols (RTP, UDP, …) VoIP Supporting Services Layer (DNS, DHCP, Web, Database, Authentication servers…) OS and Network Layer (Linux, Unix, Windows) Configuration Database PBX Call Manager Remote/Local Hundreds of permutations and attack vectors Device Level Vulnerabilities and Exploits Security Layers 8

Converged Networks Security Protection Prevention Mitigation Converged Data, Voice and Video Network Prevention Compliance assessment Vulnerability and Risk Assessment Patching Protection Perimeter (Firewall, IPS, SPIT) Internal (HIPS, NAC, Encryption) Mitigation Security attack impact mitigation Processes People Processes Modified to accommodate VoIP specific security requirements People Education and awareness training 9

Corporate Firewall VIPS/Anti-SPIT IP PBX/Softswitch/ Call Manager PRI / BRI / Analog Lines Internet IP PBX/Softswitch/ Call Manager PSTN Enterprise VoIP Network VoIP Phones PCs/ VoIP Soft Phones VA/CM VIPS/VNAC Corporate SBC Corporate VoIP Network Corporate Data Network Departmental IPS/NAC Departmental IPS/NAC Departmental IPS/NAC Data Calls VIPS/VNAC SIM Enterprise VoIP Security Infrastructure 10 VoIP Service Provider

VoIP Best Practices 11

Best Practices – VoIP Risk Assessment Pre-deployment or existing VoIP installations Identify threats that could adversely affect critical operations and assets Estimate the probability that such threats being exploited based on historical information and judgment of experts Identify and rank the value, sensitivity, and criticality of the operations and assets that could be affected. Determine which operations and assets are the most important. Estimate, for the most critical and sensitive assets and operations, the potential losses or damage Identify the best actions to mitigate or reduce the risk. These actions can include implementing policies, procedures and technical or physical controls Document the results and develop an action plan 12

Best Practices – Risk Assessment Critical Success Factors Obtain C level, IT, security and telecommunication department support Involve VoIP equipment vendor(s)Designate primes for various activities Define procedures Involve business and VoIP/UC technical experts Keep the scope well defined and focused Document and maintain results 13

Best Practices – Pre-deployment 1.Execute Risk Assessment process 2.Create VoIP Security Architecture Design & Implementation Document 3.Make it an integral part of VoIP RFP process 4.Create a lab infrastructure corresponding to the production VoIP deployment 5.Run vulnerability assessment on the VoIP equipment 6.Install and test VoIP security applications identified in (1) 7.Run effectiveness assessment on the VoIP security apps 8.Put it all together and run false/positive realistic tests: Blocking attacks Blocking legitimate traffic 14

Best Practices – Existing Installations 15 1.Execute Risk Assessment process 2.Create VoIP Security Architecture Design & Implementation Document 3.Provide business case for deploying VoIP security 4.Run vulnerability assessment on the production VoIP equipment. Fix the issues by patching, reconfiguration or network tuning 5.Create a lab infrastructure corresponding to the production VoIP deployment 6.In the lab install and test VoIP security applications identified in (2) 7.In the lab run effectiveness assessment on the VoIP security apps 8.In the lab put it all together and run false/positive realistic tests: Blocking attacks Blocking legitimate traffic 9.Run pilots/stage the security apps deployment in production

Best Practices – Specific Recommendations 1.Be proactive : – Acquire VoIP VA tool or procure VoIP VA Services – Make sure VoIP is part regulatory compliance framework 2.Protect your infrastructure – Use Session Border Controller as a access point for SIP trunks – Deploy VoIP IPS with VoIP specific signatures sets and detection engines – Deploy VIPS sensors in remote locations – Encryption/Authentication where it makes sense – Use VPN to carry traffic amongst the sites if it provides required QoS – Consider Data Leakage Protection on VoIP – For large number of home office or travelling employees consider deployment of VNAC functionality – If SPIT is a risk you identified you should acquire anti-SPIT appliance

Best Practices – Specific Recommendations 3. Manage PBX configuration: – Default passwords, barrier codes, access codes – Employees who are no longer with the company – Local administrators – Administrative access – User profiles – Adds/Moves – Toll fraud

Best Practices – Operationalize VoIP Security 18 Write polices and procedures how to manage, for example: – Passwords, barrier codes, access codes, etc. – Accounts owned by people who are no longer with the company: end-point PBX profiles, voice mail, remote access, admin access, etc. – Changes made by VoIP administrators – admin passwords – Vulnerability assessment process – VoIP remote access policy – Usage of softclients on the laptops – Contractors, business partners access to VoIP infrastructure

Best Practices – Operationalize VoIP Security 19 Integrate VoIP security infrastructure with the existing management tools and processes, for example: – Integration with SIM/SEM systems – Tracking changes in PBX configuration – User adds and moves –Patching process – Relationship with VoIP Service Provider(s) – Integration with , IM and other UC applications

Best Practices – Advice 20 Don’t think you are secure because: – You use only PSTN trunks – You implemented VLAN based separation of VoIP and data – You have a solid data security infrastructure – You encrypted all the traffic – Your VoIP equipment vendor told you so

Thank You