Voice over Internet Protocol (VoIP)

DHS 4300A Sensitive Systems Handbook

Attachment Q5

To Handbook v. 11.0

Voice over Internet Protocol (VoIP)

Version 11.0 December 22, 2014

Protecting the Information that Secures the Homeland

DHS 4300A SENSITIVE SYSTEMS HANDBOOK

ATTACHMENT Q5 ? VOICE OVER IP

This page intentionally blank

V11.0, December 22, 2014

ii

DHS 4300A SENSITIVE SYSTEMS HANDBOOK

ATTACHMENT Q5 ? VOICE OVER IP

Document Change History

Version

HB version 11.0

Date

December 22, 2014 New document.

Description

V11.0, December 22, 2014

iii

DHS 4300A SENSITIVE SYSTEMS HANDBOOK

ATTACHMENT Q5 ? VOICE OVER IP

CONTENTS

1.0 INTRODUCTION ..........................................................................................................................................................1 1.1 Purpose and Scope.........................................................................................................................................................1 1.2 VoIP Security Requirements Checklist............................................................................................................................1

2.0 VoIP System Overview................................................................................................................................................1 2.1 VoIP System Architecture ..............................................................................................................................................1 2.2 Federal Guidance and Polices........................................................................................................................................2

3.0 THREAT OVERVIEW ....................................................................................................................................................3 3.1 VoIP Threats and Vulnerabilities..................................................................................................................................3 3.1.1 Eavesdropping......................................................................................................................................................3 3.1.2 Network Vulnerabilities .......................................................................................................................................4 3.1.3 Software Flaws and malware...............................................................................................................................4 3.1.4 Other Voice Service Related Threats ...................................................................................................................4

4.0 SECURING VoIP COMPONENTS...................................................................................................................................4 4.1 VoIP Security Mechanisms.............................................................................................................................................5 4.2 Authentication...............................................................................................................................................................5 4.3 Virus Protection .............................................................................................................................................................5 4.4 Disabling Undesirable VoIP Features.............................................................................................................................5 4.5 Monitoring of System Configuration Change ................................................................................................................5

5.0 SECURING VoIP Networks...........................................................................................................................................5 5.1 Voice and Data Separation............................................................................................................................................6 5.2 Data Protection .............................................................................................................................................................6 5.3 Firewalls.........................................................................................................................................................................6 5.4 URL ................................................................................................................................................................................6 5.5 Logs................................................................................................................................................................................6 5.6 Configuration Control ....................................................................................................................................................6 5.7 Physical Security ............................................................................................................................................................7 5.8 Security Assessment ......................................................................................................................................................7 5.9 Security Incident Response ............................................................................................................................................7

6.0 Communication Service Convergence ? Unified Communications ..............................................................................7

V11.0, December 22, 2014

iv

DHS 4300A SENSITIVE SYSTEMS HANDBOOK

ATTACHMENT Q5 ? VOICE OVER IP

Appendix A: Checklist for Securing VoIP Systems...............................................................................................................9 Appendix B: Referenced Publications .............................................................................................................................. 12 Appendix C: Acronyms and Definitions ............................................................................................................................ 13

V11.0, December 22, 2014

v

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download