28
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Secure Unified Communications Daniel Tirado [email protected] Ramón Romero [email protected]

Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1

Secure Unified Communications

Daniel Tirado [email protected]

Ramón Romero [email protected]

Page 2: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2

True UC Security Requires a Secure Network AND Secure Telephony

Secure TelephonySecure NetworkSecure UnifiedCommunications

“Organizations must focus on creating efficiencies across all aspects of UCC ownership. Including: Hygiene, Compliance, Integration, Security & Identity and Management.”- Key Issues for Unified Communications & Collaboration; Gartner, 3/07

Page 3: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3

All Your Constituencies Have A Role In Building A Secure UC System

Secure UnifiedCommunications

SecOpsSecOpsSecOps

TelOpsTelOpsTelOpsExecsExecsExecs

NetOPsNetOPsNetOPs

“Participation of a cross-section of relevant IT personnel in the planning process is crucial to a comprehensive and actionable UCC strategic plan.” Gartner, March 2007

Page 4: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4

Secure UC: Today……

Page 5: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5

Security as an Option Security as INTEGRAL to System� Reduced complexity

� Tighter integration between network and applications

� Easier deployment and management

� Lower TCO

� Very complex environment

� Higher integration cost

� Slower service / feature roll-out

� Larger management overhead

� Lowest common feature support

� Security risks not mitigated

� Lower reliability

Security built as an integrated system

Page 6: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6

Secure UC Best Practices

Page 7: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7

Secure Unified Communications RisksBest practice – Threats to Risk mapping

Threats

Business Risk

Security Policy

Countermeasures

� There is no standard best practices for securing UC systems

� Provide a contextual framework to evaluate your security needs.

Identify what needs to be protected

How far you need to go to achieve your organizational goals

Maps risks to the right solutions

� Threats and Risks provide the context for what countermeasures to employ

� Security Policy embodies the goals of the organization and the guidelines for achieving a secure system

� Countermeasures should be based around a defense in depth architecture that leverages security functions in

Call Control

Endpoints

Applications

Network

Page 8: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8

� Eavesdropping – Greatest perceived risk

Listening/Recording to audio or video conversations

Risk: Loss of Privacy (Regulatory Issues, Reputation)

� Denial of Service (Internal)

Loss of service

Risk: Loss of Productivity, Safety and Security impact (E911)

� Compromised System Integrity

Hacker control of applications or call control infrastructure

Risk: Financial (Toll Fraud), Data Theft, Regulatory Issues (Loss of Privacy)

� Compromised UC Clients (e.g. Softphones)

Hacker control of platforms that are UC Clients

Risk: Financial (Toll Fraud), Data Theft (Customer Information - IPCC Agent Desktop)

Secure UC Threats and Risks Examples

Page 9: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9

Network as the Platform

Building A Secure UC SystemProtecting all elements of the UC system

InfrastructureSecure connectivity and transport

EndpointsAuthenticated IP phones, soft clients and other devices

ApplicationsAuto-attendant, Messaging, and Customer Care

Call ControlSecure Protocols for Call Management Features

Unified Communications

Page 10: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10

Balancing Risk

Intrusion Prevention SolutionDynamic Port Security/Source Guard

Phone Security Settings

Scavenger Class QOSDynamic ARP InspectionSigned Firmware & Configuration

Directory Integration (SLDAP)DHCP SnoopingHTTPS

IPSec & SRTP for GatewaysManaged CSA (Windows only)Anti-Virus (Windows Only)

Network Anomaly DetectionOptional OS Hardening/PatchingUnmanaged CSA

802.1X & NACSecurity Event ManagementStandard OS Hardening

TLS & SRTP for PhonesRemote Access VPNBasic Layer 3 ACL’s (Stateless)

Rate LimitingEncrypted Configuration FilesSTP, BPDU Guard, SmartPorts

UC Aware FW w/TLS ProxyUC-Aware FirewallsSeparate Voice & Data VLANs

High

Hard or Not Integrated

Medium

Moderate and Reasonable

Low

Easy or Default

Cost - Complexity - Resources – Performance - Manpower - Overhead

Page 11: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11

Secure UC Campus

Page 12: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12

Network Infrastructure SecurityBaseline – Intermediate - Advanced

Intermediate

• User-Based Rate Limiting

• Dynamic Port Security

• DHCP Snooping

• Dynamic ARP Inspection

• IP Source Guard

• ASA/FWSM Firewalling & NAC

Advanced

• Advanced QoS (Scavenger Class, etc)

• 802.1x

Basic

• Spanning Tree Protection

• BPDU Guard

• Root Guard

• Basic Access Control Lists (ACLs)

• No static 802.1q trunks

• Separate Voice and Data VLANs

• Cisco Smart Ports (Auto QoS)

Page 13: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13

Why do we need QoS for SecurityCisco Smart Ports

� Why do we need QoS for Security - Availability

Guarantee service under emergency situation (E911)

Prevent unauthorized applications gaining priority (P2P etc)

� What is Cisco Smart Ports

A set of pre-configured macros based on Cisco recommended baselines (Desktop, Switch, Router, Wireless, Phone)

Makes implementing basic QoS and security easier with Cisco infrastructure

Available on all currently shipping access switches

Default policy for voice vlan restricts bandwidth to 128k with rate limiting

Default policy for voice ports includes Port Security

� What the Benefit?

Smart Ports simplify secure deployment of access ports

Adv

Intermediate

Base

Page 14: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14

Secure UC - Cisco Security Appliances

Solving UC Security Challenges

Page 15: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15

Cisco ASA and Secure UC Deployment Topologies

Data Center or IP PBX/CUCM Security

SP SIP

Network

Cisco ASA 5500

Worm/Virus

UnwantedApplication

Spyware

Illegal Access

Exploit

Remote Access

VPN UserCisco ASA 5500

Cisco ASA 5500

SIP trunk

Remote Access Security

SIP Trunk Security Trust Boundary Security

Cisco ASA 5500

Trusted Network

UntrustedNetwork

Page 16: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16

Cisco ASA Features To Protect Cisco Unified Communications Manager

� Dynamic port opening for voice and applications

� Ensure SIP, SCCP, H.323, MGCP requests conform to standards

� Prevent inappropriate SIP Methods from being sent to Communication Manager

� Network Rate Limit SIP Requests

� Policy enforcement of calls (whitelist, blacklist, caller/called party, SIP URI)

� Enable only “registered phones”to make calls

� Enable inspection of encrypted phone calls

� Use IPS functionality with voice/video signatures to target latest UC vulnerabilities

Internet

WAN

Cisco ASA

with SSL

VPN

Cisco ASA

with VPN

Cisco ASA

with FW, IPS

and VPN

Page 17: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17

Large Enterprise Customer ChallengeSolving the Firewall & Encryption Integration Problem

Two key security functions cannot co-exist or integrate

Encrypted calls must encrypt the signaling (TLS) because phones have the media encryption keys sent to them by CUCM via the signaling

Firewalls need to inspect the signaling traffic to

� Open Media pinholes

� Apply Protocol Conformance

� Apply Application Inspection and Control (AIC)

Customer Security policy mandates

� All Servers, including CUCM, must be firewalled for their protection

� Key end users must have all phone calls encrypted

Problem Customer Options Cisco Solution

Choose Encryption or Firewalling, but not Both

The ASA TLS Proxy (ASA 8.0)

Page 18: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18

Encrypted Voice Security SolutionSecurity – UC – Network Integration

SRTP media

TLS signaling

CUCM encrypted calls with SRTP/TLS can now be inspected by Cisco ASA 5500 Adaptive Security Appliances:

• Maintains integrity and confidentiality of call while enforcing security policy through advanced SIP/SCCP firewall services

• TLS signaling is terminated and inspected, then re-encrypted for connection to destination (HW Based encryption)

• Dynamic port is opened for SRTP encrypted media stream, and automatically closed when call ends

Encrypted Endpoint Encrypted

Endpoint

Page 19: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19

Secure UC Remote Access/Mobility

Cisco ASA 8.0.4 Release

Page 20: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20

User Expectations

Secure Remote AccessTechnical Challenges – Data to UC enabled remote access

Device Proliferation

Increased Mobility

-Digital nomads, full-time remote employees, teleworkers

Device Proliferation

-iPhone, Windows Mobile, Android

-Thin Client/ Embedded

Platform Diversification

-Windows, MacOS, Linux

Demands on Secure Connectivity Today� Seamless user experience� Access to a variety of applications including UC and collaboration tools� Consistent access from a number of diverse clients (IP Phones, Mobile, Laptop)

Page 21: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21

Cisco ASA 5500 Series UC Proxy FeaturesUnification of Data and UC Remote Access Services

Simplified and Secure Deployment of Remote phones, Mobile clients, and Presence architectures

IPSec VPN Clientless SSL

VPN

SSL VPN Phone Proxy Mobility Proxy Presence

Federation

Proxy

Cisco ASA – strategic

remote access platform

New New

New

Page 22: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22

Cisco ASA Phone Proxy Remote Access and Voice/Data Segmentation

Secure Remote Access:

� Leverage native Cisco IP Phone encryption (TLS/SRTP) to enable secure calls from IP Phones on untrusted, remote networks

� Seamless deployment and operation with minimal impact on existing UC infrastructure

� Simplified user experience – Plug and play

� A Remote Access UC Solution for UC devices

Trusted (Un-secured) Un-trusted

Internet

Encrypted (TLS/SRTP)Cisco IP phone (remote)

Cisco IP Phone

Unencrypted/encrypted

Page 23: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23

Mobile Data Network

GPRS data channel CUMA

Enterprise Server

MAMA

Collaboration

Voice mail

Presence

Call Control

Directory

Email

ASA

PSTN

Cisco ASA Mobility ProxyIntegration with Cisco Unified Mobility Solutions

Secure Mobility: ASA protection for Cisco Mobility Solution

� Core component of mobility architecture

� Converges Mobility onto a common remote access platform

� Protection for Cisco Mobility Protocol (MMP)

� Protection for the CUMA Enterprise Server (TLS Proxy)

MMP/SSL/TLS

Page 24: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24

Cisco ASA and PresenceIntegration with Cisco and 3rd party Presence Solutions

Secure Presence

� Enterprises with Cisco Presence Servers can now collaborate securely with enterprises with Microsoft Presence Servers

� Presence information can be shared between two organizations

� All Cisco ASA UC security capabilities apply to Presence traffic

� Cisco ASA: Strategic Platform for converged remote access and mobility for UC Applications and Services

Internet

MAMA

Cisco Unified

Presence Server

Cisco Unified Mobility

Advantage Server

Routing

Proxy

UK

HK

US

ASA

Microsoft Presence Server

Cisco Unified

Presence Server

TLS

TLS

Page 25: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25

NAC & IPS

Page 26: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26

Cisco NAC Profiler

1. NAC Profiler Collector (a software agent running on Cisco NAC Server) discovers and profiles

devices and consolidates the information to send to the NAC Profiler Server

2. NAC Profiler Server aggregates all of the information from the Collectors and maintains a database of

all network-attached endpoints (e.g. phones, printers, badge readers, modalities, etc.)

3. NAC Profiler Server continuously maintains the Filters List via the NAC API and provisions the

appropriate access decisions (allow, deny, check, “role”, or ignore)

4. NAC Profiler Collector continuously monitors behavior of profiled devices (to prevent spoofing) and

updates Profiler Server

Mac

NAC Appliance Manager

NAC Profiler Server

AAA Server

Windows AD

NAC API

NAC Appliance Server

with NAC Profiler Collector Application

SPAN 1

3

24

Page 27: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27

Cisco IPS Business-Protection Solutions

Intrusion Prevention Solution Platform

Comprehensive, Collaborative Network Intrusion Protection for Business Solutions

Comprehensive, Collaborative Network Intrusion Protection for Business Solutions

Traffic Normalization

Call-Anomaly Detection

Voice and IP Traffic-Aware Detection

Vulnerability Protection for SIP/SCCP/H.323,

etc.

SIP/SCCP/H.323 Protocol-Anomaly

Detection

Cisco Unified Communications Protection SolutionCisco Unified Communications Protection Solution

Local Event Correlation

Cisco IPS Unified Call Manager Protection Package

Includes Call Devices, Call Manager Applications, Operating Systems, IP Networks, and Voice Protocols

Includes Call Devices, Call Manager Applications, Operating Systems, IP Networks, and Voice Protocols

Page 28: Secure Unified Communications - Cisco · Best practice –Threats to Risk mapping Threats Business Risk Security Policy Countermeasures There is no standard best practices for securing

© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28