[VOIPSA Best Practices] Best Practices document structure set -next question: are these the appropriate areas?

Nhut Nguyen nnguyen at sta.samsung.com
Fri Jan 19 11:35:35 CST 2007


Hi All,

 

Great discussion! 

 

Regarding SPIT I am not sure if the industry has any good practices yet.
I believe this problem is emerging but solutions are still in the
research stage. However, it may be a good idea to have a stub or a place
holder to document emerging practices like these, or those that address
security issues of presence information, for example!

 

Cheers,


Nhut

 

________________________________

From: bestpractices-bounces at voipsa.org
[mailto:bestpractices-bounces at voipsa.org] On Behalf Of Jozef Janitor
Sent: Friday, January 19, 2007 11:23 AM
To: dan_york at Mitel.com; bestpractices at voipsa.org
Subject: Re: [VOIPSA Best Practices] Best Practices document structure
set -next question: are these the appropriate areas?

 

Does the point #8 describe also the fail-over procedures? So if my
primary call controller broke down then the second call controller will
automatically handle the active calls? This may involve some clustering
techniques.

 

Also important part of voip security is the credibility of an incoming
calling number (callid). Because in the PSTN network normally I can't
change my callid, but in the VoIP it's usually not a big problem. Maybe
this problem could be handled with ENUM.

 

QoS - this is very important when we are going to talk about security in
voip. We have to consider what level of security do we need because the
encryption of traffic and other security features are always adding
additional delay to the transported voice. If the value of this
additional delay is going to be too high then our call is maybe for 100%
secured but it's not pleasant to hear.

 

And SpIT. We know that controlling SPAM in our emails is very difficult
. But controlling SPAM in VoIP will be even more difficult. So I hope
that some pages in this document will also cover the possibilities of
solving the SpIT problem.

 

All the best,

   Jozef Janitor

   www.cnl.tuke.sk

 

 

 

From: bestpractices-bounces at voipsa.org
[mailto:bestpractices-bounces at voipsa.org] On Behalf Of
dan_york at Mitel.com
Sent: Friday, January 19, 2007 11:58 AM
To: bestpractices at voipsa.org
Subject: [VOIPSA Best Practices] Best Practices document structure set -
next question: are these the appropriate areas?

 


Best Practices team, 

Thank you to those of you who sent in comments either on the list or
directly to me.  A special thanks to Eugene Nechamkin who took the time
to write up a counter-proposal. Outside of his contribution, basically
all the feedback was for proposal #2, structuring the document around
functional areas, and so I'm going to say we're going with that. 

Now, the next question - is this list below from the wiki the
appropriate list of areas for VoIP-related best practices? 

1.        Securing Voice and Media stream 
2.        Securing Call Control 
3.        Securing Management Interfaces and APIs 
4.        Securing PSTN Interfaces and Traditional Telephony Issues
(i.e. don't forget toll fraud) 
5.        Securing Servers and Operating Systems 
6.        Securing IP Endpoints (ex. sets, softphones, etc.) 
7.        Securing the TCP/IP network (ex. VLANs, 802.1X, wireless,
etc.) 
8.        Physical Security, including backups, power, etc. 

Are we missing any major areas?  Should these be modified or tweaked? 

It seems to me to be a complete list, but then again, I wrote it, so of
course it would.  Any feedback is welcome. 

Regards,
Dan 

-- 
Dan York, CISSP
Dir of IP Technology, Office of the CTO
Mitel Corp.     http://www.mitel.com
dan_york at mitel.com +1-613-592-2122
PGP key (F7E3C3B4) available for 
secure communication

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://voipsa.org/pipermail/bestpractices_voipsa.org/attachments/20070119/2a2272a2/attachment.htm>


More information about the bestpractices mailing list