[VOIPSA Best Practices] Best Practices document structure set - next question: are these the appropriate areas?

dan_york at Mitel.com dan_york at Mitel.com
Mon Jan 22 09:41:48 CST 2007


Nhut,

Good comments. I don't actually consider that much of a scope creep 
because we've said that each best practice should note which security test 
tools could be used to test the individual best practices.  So each BP 
entry should say which tool(s) could be used to test if your system is 
vulnerable. Or another view is... implementing the BP protects you against 
attacks/probes from which tools.

Separately from the BP document, Shawn Merdinger and Dustin Trammel have 
developed a security tools list that we're planning to promote in 
conjunction to this BP document.  As this project moves along, we'll bring 
that tools list into this discussion as well.

So yes, we should include it, but the current thinking is as a separate 
list of tools.  Hmmm... however, it could be argued that we're not talking 
about best practices in how to do that testing... perhaps there is a need 
for something that is specific about issues for vulnerability testing *for 
VoIP*.

Thoughts?
Dan

P.S. Nhut, I *did* have a nice weekend... too cold and windy to go 
cross-country skiing, but at least we do have snow cover!  (Important in 
these parts (Vermont, USA) at this time of year.)

-- 
Dan York, CISSP
Dir of IP Technology, Office of the CTO
Mitel Corp.     http://www.mitel.com
dan_york at mitel.com +1-613-592-2122
PGP key (F7E3C3B4) available for 
secure communication






"Nhut Nguyen" <nnguyen at sta.samsung.com>
01/22/2007 10:28 AM
 
        To:     <dan_york at Mitel.com>, <bestpractices at voipsa.org>
        cc: 
        Subject:        RE: [VOIPSA Best Practices] Best Practices 
document structure set - next question: are these the appropriate areas?


Dan et. al.,
 
Hope that everyone had a good weekend! 
 
With the risks of “scope creeping” J, I would like to bring to the team 
attention something that occurred to me over the weekend: vulnerability 
testing! If appears to me that best practices and to VoIP security 
vulnerabilities testing may be something that VoIP practitioners, 
especially people who run VoIP networks and services, will need and 
welcome.
 
For this we can either:
 
1.      Embed a vulnerabilities testing sub-section in each of the 
sections outlined by Dan, or
2.      Have a separate section on VoIP vulnerabilities testing best 
practices (and tools) at the end of the document 
 
I think both approaches have merits and demerits, and am curious about 
what others think!
 
My apology if this issue has been discussed in the past, but thought that 
it may merit some mentioning in the BP document.
 
Cheers,
 
Nhut

From: bestpractices-bounces at voipsa.org 
[mailto:bestpractices-bounces at voipsa.org] On Behalf Of dan_york at Mitel.com
Sent: Friday, January 19, 2007 4:58 AM
To: bestpractices at voipsa.org
Subject: [VOIPSA Best Practices] Best Practices document structure set - 
next question: are these the appropriate areas?
 

Best Practices team, 

Thank you to those of you who sent in comments either on the list or 
directly to me.  A special thanks to Eugene Nechamkin who took the time to 
write up a counter-proposal. Outside of his contribution, basically all 
the feedback was for proposal #2, structuring the document around 
functional areas, and so I'm going to say we're going with that. 

Now, the next question - is this list below from the wiki the appropriate 
list of areas for VoIP-related best practices? 

1.        Securing Voice and Media stream 
2.        Securing Call Control 
3.        Securing Management Interfaces and APIs 
4.        Securing PSTN Interfaces and Traditional Telephony Issues (i.e. 
don't forget toll fraud) 
5.        Securing Servers and Operating Systems 
6.        Securing IP Endpoints (ex. sets, softphones, etc.) 
7.        Securing the TCP/IP network (ex. VLANs, 802.1X, wireless, etc.) 
8.        Physical Security, including backups, power, etc. 

Are we missing any major areas?  Should these be modified or tweaked? 

It seems to me to be a complete list, but then again, I wrote it, so of 
course it would.  Any feedback is welcome. 

Regards,
Dan 

-- 
Dan York, CISSP
Dir of IP Technology, Office of the CTO
Mitel Corp.     http://www.mitel.com
dan_york at mitel.com +1-613-592-2122
PGP key (F7E3C3B4) available for 
secure communication

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://voipsa.org/pipermail/bestpractices_voipsa.org/attachments/20070122/531735d2/attachment.htm>


More information about the bestpractices mailing list