Securing IP Telephony Systems

08 Jun 11:19

New White Paper from Networks First offers practical plan to ensure the security of VOIP traffic.

Networks First, a specialist maintainer of network infrastructures, has launched a new White Paper that provides end-users, resellers and systems integrators with a simple step-by-step guide to securing IP Telephony systems.

The increasing maturity of VoIP and converged network technology is driving both enterprise and smaller organisations to reconsider the relative expense of having separate voice and data infrastructures. Instead, increasing numbers of UK businesses are opting for the benefits that a converged network and application model, based on an underlying Voice over IP (VoIP) infrastructure, can offer including reduced cost of ownership, increased business efficiency and significant user productivity gains.

Unfortunately, with IT, data and network security concerns taking up an ever greater percentage of IT Directors budgets, according to recent research from Gartner - with over 40 per cent of businesses last year spending seven per cent or more of their IT budget on security, as opposed to the recommended three to six per cent guideline a number which is furthermore set to increase, there is a significant danger that organisations investing in converged networks are not properly considering or being advised on, the security implications for VoIP traffic.

In order to address this problem, Networks First has identified a set of simple, yet practical steps for end-users, resellers and systems integrators to follow in order to ensure the security of a converged voice and data network.

1. Take a holistic approach
It is imperative that there is a holistic approach to IT security, so that the voice system is included in overall security risk analysis and applies best practices as deemed appropriate, aligned to data system security measures as a minimum. These would include the following measures:


2. Assess the risks in line with business implications
Although the threats and type of attack methods for both voice and data traffic may be similar, the implications of losing part of or the entire phone system will be different in terms of a risk to business operations and costs.
Having performed a risk assessment on the implications of any given threat on the business, hardening key voice components may be necessary as well as providing conventional network based security controls.

3. Secure the network infrastructure
There are several recommended techniques for securing the network infrastructure:


4. Consider and implement additional IP Telephony security requirements
Having performed a risk assessment on the implications of any given threat on the business it may be necessary to consider these additional security enhancements for the IP Telephony system:


5. Consider external, expert advice
Many resellers and implementers of converged networks and IP Telephony solutions will have domain expertise in one area of these, only some and even fewer end-users, will have the relevant expertise in-house to assess the full security implications of a converged IP Telephony network.

A full white paper from Networks First entitled Securing IP Telephony Systems Best Practises is freely downloadable.

Related links: (Open in a new window.)
www.networksfirst.com/

Taken from Information Security Bulletin.