Securing Session Controllers -The NSA way
Bonus article! We have already wrapped up 20 articles, but hereâs a bonus â just as good and just as free as the earlier content! ðÂ
Iâve mentioned multiple times that a lot of the information for these articles comes straight from the NSA document on securing VVOIP systems. In the NSAâs worldview, the fourth plane of security for VVoIP systems is to secure the call processing systems â often called session managers or session controllers.Â
Session Controllers are software systems â in the data world, they would be called servers â often loaded on dedicated, OEM-approved hardware. Thus, they face all the security challenges relevant to regular software servers (database, file, web, etc.) and those specific to their task â connection, management, control of media, and signaling streams. In this article, we will briefly touch upon the risks to session controllers and the mitigations thereof.Â
Software and application protectionÂ
As with all software servers, session controllers must deal with user management and permissions, configurations, logging, and so on. Here is a brief overview:Â Â
User accounts and passwordsÂ
Very simply, the more users that have access to the server, the higher the chances of it being compromised. Ensure limited user access, and within that, ensure as few privileges as possible for each user. Remove or disable as many default user accounts as possible. For the rest, change the passwords, making them as complex as possible. If 2FA or MFA is possible, enable them.Â
Server configurationsÂ
OEMs usually ship systems with maximum features enabled, but that causes security issues. Some features may enable security compromises. Make sure that only features that are necessarily required are enabled; disable the rest. For the features that are enabled, ensure that their security impact is studied and controlled.Â
Audit logs Â
Audit logs are critical for systems â to understand issues with functionality. But they can also serve a security function.Â
Enable logging of all accesses to the server, tracking who connected to the server and when and what changes were made. Also, ensure CDRs are enabled â they help identify and track issues like toll fraud.Â
The challenge with all these logs is the sheer amount of information â looking for patterns and information in them is like looking for the proverbial needle in the haystack, with the twist that we have never seen what those needles look like. SIEM systems that help aggregate all the logs are useful, especially when they have plugins that look for specific patterns in the logs â patterns that indicate issues or malicious actors.Â
Recommended by LinkedIn
Â
More useful are tools that use domain-specific knowledge and AI to detect patterns â especially if they can combine the log information with traffic patterns to identify malicious activity. Obligatory pitch â Assertion is a leader in this business and if you want to know more, get in touch! Â
Software vulnerabilitiesÂ
As with all software, vulnerabilities get discovered in session controllers as well â keep patching regularly to avoid grief from malicious actors exploiting the vulnerabilities. Similarly, make sure that the operating systems, databases, and other supporting software are also kept secure and up to date. In case the session manager uses third-party databases, make sure that connectivity is secure and the database itself is secure and, if possible, encrypted.Â
Network servicesÂ
Another thumb rule of security â enable as few services as possible â the higher the number of services present on the session controller server, the greater its attack surface.Â
Disable FTP, DNS, DHCP, and SNMP. Any service that is not being used on this server. Â
Cryptographic Key MaterialÂ
When your session controller provides encrypted communication, it also stores the cryptographic keys needed for authentication and encryption. Secured access to these keys is critical â a malicious actor with access to these keys can undermine the communication system completely, impersonating the server itself and eavesdropping on calls.Â
Â
Encrypt access to these keys, back them up on systems that are not connected to the network, and use cryptographic hardware tokens when possible. Â
Physical SecurityÂ
All the software security is worthless if bad actors get access to the physical system itself. One simple way for a bad actor to mess with the system is to shut down the server itself. Ensure strict controls on access to the server, and keep it in a monitored, access-controlled system.
Business Owner at isoftwarestore
1yamazing!