Controlling the Communications Perimeter Security
Last week, we talked about securing the network plane, and this week, we talk about controlling the perimeter. In line with the Pareto principle, securing the network and the perimeter accounts for 80% of the enterprise-critical aspects of communication security. Here are the key risks that you have to be aware of at the perimeter.Â
The Border is a difficult placeÂ
Risks from Direct Internet connectivityÂ
Assume you have a remote office in Podunk, somewhere in the middle of nowhere. Itâs impossible to get a leased line there because the CLEC is just too slow and incompetent. You decide to use the normal internet to carry voice traffic between your Podunk and New York offices. This makes life easier but also exposes your organizationâs traffic to all third parties that carry the traffic between the two offices.Â
Risks to Wide area network (WAN) linksÂ
If you are a nationally or globally distributed organization that uses leased lines to connect remote offices, you are exposed to the potential risk of exposing your internal networks to the outside world, simply by traversing over third-party networks. A compromise here is potentially catastrophic and at that point, not only is your communication network exposed but so are all your other data and systems. Â
Recommended by LinkedIn
Risks to Gateway DevicesÂ
Signaling gatewaysÂ
As calls move from an IP-based corporate network to public networks (and vice versa), signaling gateways translate call information between IP-based systems and carrier protocols such as SS7 and others. Attackers love to compromise signaling gateways because of their wealth of information and control. A compromised gateway not only causes disruption to the call network, but it also yields information such as network topology and subscriber information. Â
Media gatewaysÂ
When calls move between IP-based corporate networks and public networks, media gateways translate the media streams between the IP-based systems and carrier media protocols. Media gateways interact closely with signaling gateways â after all, it is the signaling gateway that tells the media gateway what to do with the media stream. The risk from a compromised media gateway is obvious â attackers get access to direct feeds of voice and video â they can choose to listen in, disrupt, or do both.Â
How to protect the perimeterÂ
Drawing inspiration from the NSA VVoIP security guidelines, here are some things you can do: