<section title="18.3. Video &amp; Telephony Conferencing and Internet Protocol Telephony"><subsection title="Objective"><paragraph
    title="18.3.1."


><![CDATA[<p>Video &amp; Telephony Conferencing (VTC), Internet Protocol Telephony (IPT) and Voice over Internet Protocol (VoIP) systems are implemented in a secure manner that does not compromise security, information or systems and that they operate securely.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="18.3.2."


><![CDATA[<p>This section covers information on VTC and IPT including Voice over Internet Protocol (VoIP).  Although IPT refers generally to the transport of telephone calls over IP networks, the scope of this section includes connectivity to the PSTN as well as remote sites.</p>]]></paragraph>
<paragraph
    title="18.3.3."


><![CDATA[<p>Additional information relating to topics covered in this section can be found in</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communications Systems and Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateways Security</a>; and</li>
<li>any section in this manual relating to the protection of data networks.</li>
</ul>]]></paragraph>
</block>
<block title="Exception for VTC and IPT gateways"><paragraph
    title="18.3.4."


><![CDATA[<p>Where a gateway connects between an analogue telephone network such as the PSTN and a computer network, <a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security</a>&nbsp; <strong>does not</strong> apply.</p>]]></paragraph>
<paragraph
    title="18.3.5."


><![CDATA[<p>Where a gateway connects between a VTC or IPT network and any other VTC or IPT network, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 – Gateway Security </a>applies.</p>]]></paragraph>
</block>
<block title="Hardening VTC and IPT systems"><paragraph
    title="18.3.6."


><![CDATA[<p>Data in a VTC or IPT network consists of IP packets and should not be treated any differently to other data. In accordance with the principles of least-privilege and security-in-depth, hardening can be applied to all handsets, control units, software, servers and gateways. For example a Session Initiation Protocol (SIP) server could:</p><ul>
<li>have a fully patched software and operating system;</li>
<li>only required services running;</li>
<li>use encrypted non-replayable authentication; and</li>
<li>apply network restrictions that only allow secure Session Initiation Protocol (SIP) and secure Real Time Transport (RTP) traffic from IP phones on a VLAN to reach the server.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="References"><paragraph
    title="18.3.7."


><![CDATA[<table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td>
<p><strong>SP 800-58</strong></p>
</td>
<td>
<p><strong>Security Considerations for Voice Over IP Systems</strong></p>
</td>
<td style="text-align: center;">
<p>NIST</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://csrc.nist.gov/publications/sp" target="_blank">https://csrc.nist.gov/publications/sp</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Security Issues and Countermeasure for VoIP</strong></p>
</td>
<td style="text-align: center;">SANS</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/1701/" target="_blank">https://www.sans.org/white-papers/1701/</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>Report Number: I332-016R-2005</strong></p>
</td>
<td>
<p><strong>Security Guidance for Deploying IP Telephony Systems Released: 14 February 2006</strong></p>
</td>
<td style="text-align: center;">
<p>Systems and Network Attack Center (SNAC) NSA</p>
</td>
<td style="width: 33%;">
<p>https://www.nsa.gov/ia/_files/voip/i332-016r-2005.pdf</p>
</td>
</tr>
<tr>
<td>
<p><strong>Report Number: I332-009R-2006</strong></p>
</td>
<td>
<p><strong>Recommended IP Telephony Architecture, Updated: 1 May 2006 Version 1.0</strong></p>
</td>
<td style="text-align: center;">
<p>Systems and Network Attack Center (SNAC) NSA</p>
</td>
<td style="width: 33%;">
<p>https://www.nsa.gov/ia/_files/voip/I332-009R-2006.pdf</p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Mobility Capability Package March 26 2012 - Secure VoIP Version 1.2</strong></p>
</td>
<td style="text-align: center;">
<p>NSA</p>
</td>
<td style="width: 33%;">
<p>https://www.nsa.gov/ia/_files/Mobility_Capability_Pkg_Vers_1_2.pdf</p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Protecting Telephone-based Payment Card Data PCI Data Security Standard (PCI DSS) Version: 2.0, March 2011</strong></p>
</td>
<td style="text-align: center;">
<p>The PCI Security Standards Council (PCI SSC)</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf [PDF, 888 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>PCI Mobile Payment Acceptance Security Guidelines Version: 1.0 Date: September 2012</strong></p>
</td>
<td style="text-align: center;">
<p>PCI SSC</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Developers_v1.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Developers_v1.pdf [PDF, 579 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>PCI Mobile Payment Acceptance Security Guidelines Version: 1.0 Date: February 2013</strong></p>
</td>
<td style="text-align: center;">
<p>PCI SSC</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Merchants_v1.pdf" target="_blank">https://www.pcisecuritystandards.org/documents/Mobile_Payment_Security_Guidelines_Merchants_v1.pdf [PDF, 630 KB]</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p><strong>Understanding Voice over Internet Protocol (VoIP): 2006</strong></p>
</td>
<td style="text-align: center;">
<p>US-CERT</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf" target="_blank">https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf [PDF, 83 KB]</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>CNSS Instruction No. 5000 April 2007</strong></p>
</td>
<td>
<p><strong>Guidelines for Voice over Internet Protocol (VoIP) Computer Telephony</strong></p>
</td>
<td style="text-align: center;">
<p>Committee on National Security Systems</p>
</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.cnss.gov/CNSS/issuances/Instructions.cfm" target="_blank">https://www.cnss.gov/CNSS/issuances/Instructions.cfm</a></p>
</td>
</tr>
<tr>
<td>
<p><strong>&nbsp;<strong>DHS 4300A</strong></strong></p>
</td>
<td><strong>DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014</strong></td>
<td style="text-align: center;"><span>DHS</span></td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf" target="_blank">https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf [PDF, 586 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Video and voice-aware firewalls"><paragraph
    title="18.3.8.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>The use of video, unified communications and voice-aware firewalls ensures that only video or voice traffic (e.g. signalling and data) is allowed for a given call and that the session state is maintained throughout the transaction.</p>]]></paragraph>
<paragraph
    title="18.3.8.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>The requirement to use a video, unified communication or voice-aware firewall does not necessarily require separate firewalls to be deployed for video conferencing, IP telephony and data traffic.  If possible, agencies are encouraged to implement one firewall that is either video and data-aware; voice and data-aware; or video, voice and data-aware depending on their needs.</p>]]></paragraph>
<paragraph
    title="18.3.8.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>Refer to Section <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16735">19.5 - Session Border Controllers</a>.</p>]]></paragraph>
<paragraph
    title="18.3.8.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3721"
><![CDATA[<p>Agencies SHOULD use a video, unified communication or voice-aware firewall that meets the same minimum level of assurance as specified for normal firewalls.</p>]]></paragraph>
</block>
<block title="Protecting IPT signalling and data"><paragraph
    title="18.3.9.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>IPT voice and signalling data is vulnerable to eavesdropping but can be protected with encryption.  This control helps protect against DoS, adversary-in-the-middle, and call spoofing attacks made possible by inherent weaknesses in the VTC and IPT protocols.</p>]]></paragraph>
<paragraph
    title="18.3.9.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>When protecting IPT signalling and data, voice control signalling can be protected using TLS and the ‘sips://’ identifier to force the encryption of all legs of the connection.  Similar protections are available for RTP and the Real-Time Control Protocol.</p>]]></paragraph>
<paragraph
    title="18.3.9.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3728"
><![CDATA[<p>Agencies SHOULD protect VTC and IPT signalling and data by using encryption.</p>]]></paragraph>
<paragraph
    title="18.3.9.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3729"
><![CDATA[<p>An encrypted and non-replayable two-way authentication scheme SHOULD be used for call authentication and authorisation.</p>]]></paragraph>
</block>
<block title="Establishment of secure signalling and data protocols"><paragraph
    title="18.3.10.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Use of secure signalling and data protects against eavesdropping, some types of DoS, adversary-in-the-middle, and call spoofing attacks.</p>]]></paragraph>
<paragraph
    title="18.3.10.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3732"
><![CDATA[<p>Agencies SHOULD ensure that VTC and IPT functions are established using only the secure signalling and data protocols.</p>]]></paragraph>
</block>
<block title="Local area network traffic separation"><paragraph
    title="18.3.11.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Availability and quality of service are the main drivers for applying the principles of separation and segregation.</p>]]></paragraph>
<paragraph
    title="18.3.11.C.01."

    tags="Network Security,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Must"
    cid="3735"
><![CDATA[<p>Agencies MUST either separate or segregate the VTC and IPT traffic from other data traffic.</p>]]></paragraph>
<paragraph
    title="18.3.11.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3736"
><![CDATA[<p>Agencies SHOULD either separate or segregate the IPT traffic from other data traffic.</p>]]></paragraph>
</block>
<block title="VTC and IPT Device setup"><paragraph
    title="18.3.12.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>VTC equipment and VoIP phones need to be hardened and separated or segregated from the data network to ensure they will not provide an easy entry point to the network for an attacker.</p>]]></paragraph>
<paragraph
    title="18.3.12.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>USB ports on these devices can be used to circumvent USB workstation policy and upload malicious software for unauthorised call recording/spoofing and entry into the data network.  Unauthorised or unauthenticated devices should be blocked by default to reduce the risk of a compromise or denial of service.</p>]]></paragraph>
<paragraph
    title="18.3.12.C.01."

    tags="Network Security,Technical"


    classification="Secret, Top Secret, Confidential"
    compliance="Must"
    cid="3740"
><![CDATA[<p>Agencies MUST:</p><ul>
<li>configure VTC and VoIP devices to authenticate themselves to the call controller upon registration;</li>
<li>disable phone auto-registration and only allow an allow list of authorised devices to access the network;</li>
<li>block unauthorised devices by default; </li>
<li>disable all unused and prohibited functionality; and</li>
<li>use individual logins for IP phones.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.12.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3741"
><![CDATA[<p>Agencies SHOULD:</p><ul>
<li>configure VoIP phones to authenticate themselves to the call controller upon registration;</li>
<li>disable phone auto-registration and use an allow list of authorised devices to access the network;</li>
<li>block unauthorised devices by default; </li>
<li>disable all unused and prohibited functionality; and</li>
<li>use individual logins for IP phones.</li>
</ul>]]></paragraph>
</block>
<block title="Call authentication and authorisation"><paragraph
    title="18.3.13.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>This control ensures server-client mutual authentication.</p>]]></paragraph>
<paragraph
    title="18.3.13.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3745"
><![CDATA[<p>Authentication and authorisation SHOULD be used for all actions on the IPT network, including:</p><ul>
<li>call setup;</li>
<li>changing settings; and</li>
<li>checking voice mail.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.13.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3747"
><![CDATA[<p>An encrypted and non-replayable two-way authentication scheme SHOULD be used for call authentication and authorisation.</p>]]></paragraph>
<paragraph
    title="18.3.13.C.03."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3748"
><![CDATA[<p>Authentication SHOULD be enforced for:</p><ul>
<li>registering a new phone;</li>
<li>changing phone users;</li>
<li>changing settings; and</li>
<li>accessing voice mail.</li>
</ul>]]></paragraph>
</block>
<block title="VTC and IPT device connection to workstations"><paragraph
    title="18.3.14.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Availability and quality of service are the main drivers for applying the principles of separation and segregation.</p>]]></paragraph>
<paragraph
    title="18.3.14.C.01."

    tags="Network Security,Technical"


    classification="Secret, Confidential, Top Secret"
    compliance="Must Not"
    cid="3751"
><![CDATA[<p>Agencies MUST NOT connect workstations to VTC or IPT devices unless the workstation or the device, as appropriate for the configuration, uses VLANs or similar mechanisms to maintain separation between VTC, IPT and other data traffic.</p>]]></paragraph>
<paragraph
    title="18.3.14.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should Not"
    cid="3752"
><![CDATA[<p>Agencies SHOULD NOT connect workstations to VTC or IPT devices unless the workstation or the device, as appropriate for the configuration, uses VLANs or similar mechanisms to maintain separation between VTC, IPT and other data traffic.</p>]]></paragraph>
</block>
<block title="Lobby and shared area IPT devices"><paragraph
    title="18.3.15.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>IPT devices in public areas may give an attacker opportunity to access the internal data network by replacing the phone with another device, or installing a device in-line.  There is also a risk to the voice network of social engineering (since the call may appear to be internal) and data leakage from poorly protected voice mail-boxes.</p>]]></paragraph>
<paragraph
    title="18.3.15.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3756"
><![CDATA[<p>Where an agency uses a VoIP phone in a lobby or shared area they SHOULD limit or disable the phone’s:</p><ul>
<li>ability to access data networks; </li>
<li>functionality for voice mail and directory services; and</li>
<li>use a separate network segment.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.15.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3758"
><![CDATA[<p>Agencies SHOULD, where available, use traditional analogue phones in a lobby and shared areas.</p>]]></paragraph>
</block>
<block title="Usage of softphones, webcams and similar sound and video devices"><paragraph
    title="18.3.16.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Software and applications for softphones and webcams can introduce additional attack vectors into the network as they are exposed to threats from the data network via the workstation and can subsequently be used to gain access to the network.</p>]]></paragraph>
<paragraph
    title="18.3.16.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Softphones and webcams typically require workstation to workstation communication, normally using a number of randomly assigned ports to facilitate RTP data exchange.  This presents a security risk as workstations generally should be separated using host-based firewalls that deny all connections between workstations to make malicious code propagation inside the network difficult.</p>]]></paragraph>
<paragraph
    title="18.3.16.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3766"
><![CDATA[<p>Agencies using softphones or webcams SHOULD have separate dedicated network interface cards on the host for VTC or IPT network access to facilitate VLAN separation.</p>]]></paragraph>
<paragraph
    title="18.3.16.C.02."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3768"
><![CDATA[<p>Agencies using softphones or webcams SHOULD install a host-based firewall on workstations utilising softphones or webcams that allows traffic only to and from a minimum number of ports.</p>]]></paragraph>
<paragraph
    title="18.3.16.C.03."

    tags="Network Security,Technical"


    classification="Top Secret, Confidential, Secret"
    compliance="Should Not"
    cid="3770"
><![CDATA[<p>Agencies SHOULD NOT use softphones or webcams.</p>]]></paragraph>
</block>
<block title="Workstations using USB softphones, webcams and similar sound and video devices"><paragraph
    title="18.3.17.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Adding softphones and webcams to an allow list of allowed USB devices on a workstation will assist with restricting access to only authorised devices, and allowing the SOE to maintain defences against removable media storage and other unauthorised USB devices.</p>]]></paragraph>
<paragraph
    title="18.3.17.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3777"
><![CDATA[<p>Agencies SHOULD use access control software to control USB ports on workstations using softphones and webcams by utilising the specific vendor and product identifier of the authorised device.</p>]]></paragraph>
</block>
<block title="Developing a denial of service response plan"><paragraph
    title="18.3.18.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>Communications are considered critical for any business and are therefore especially vulnerable to Denial of Service (DoS). &nbsp;The guidance provided will assist in protecting against VTC or IPT DoS attacks, signalling floods, established call teardown and RTP data floods. &nbsp;These elements should be included in the agency’s wider response plan (See <a title="Business Continuity and Disaster Recovery" href="http://nzism.gcsb.govt.nz/ism-document#Section-13074">Section 6.4 – Business Continuity and Disaster Recovery</a>).</p>]]></paragraph>
<paragraph
    title="18.3.18.R.02."

    tags="Network Security,Technical"


><![CDATA[<p>Simple DoS attacks and incidents are often the result of bandwidth exhaustion.  Agencies should also consider other forms of DoS including Distributed Denial of Service attacks (DdoS), DNS and latency incidents.</p>]]></paragraph>
<paragraph
    title="18.3.18.R.03."

    tags="Network Security,Technical"


><![CDATA[<p>System resilience can be improved by architecting a structured approach and providing layered defence such as network and application protection as separate layers.</p>]]></paragraph>
<paragraph
    title="18.3.18.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3782"
><![CDATA[<p>Agencies SHOULD develop a Denial of Service response plan including:</p><ul>
<li>how to identify the precursors and other signs of DoS;</li>
<li>how to diagnose the incident or attack type and attack method;</li>
<li>how to diagnose the source of the DoS;</li>
<li>what actions can be taken to clear the DoS; </li>
<li>how communications can be maintained during a DoS; and</li>
<li>report the incident.</li>
</ul>]]></paragraph>
</block>
<block title="Content of a Denial of Service (DoS) response plan"><paragraph
    title="18.3.19.R.01."

    tags="Network Security,Technical"


><![CDATA[<p>An VTC or IPT DoS response plan will need to address the following:</p><ul>
<li>how to identify the source of the DoS, either internal or external (location and content of logs);</li>
<li>how to diagnose the incident or attack type and attack method;</li>
<li>how to minimise the effect on VTC or IPT, of a DoS of the data network (e.g. Internet or internal DoS), including separate links to other office locations for VTC and IPT and/or quality of service prioritisation;</li>
<li>strategies that can mitigate the DOS (banning certain devices/Ips at the call controller and firewalls, implementing quality of service, changing VoIP authentication, changing dial-in authentication; and</li>
<li>alternative communication options (such as designated devices or personal mobile phones) that have been identified for use in case of an emergency.</li>
</ul>]]></paragraph>
<paragraph
    title="18.3.19.C.01."

    tags="Network Security,Technical"


    classification="All Classifications"
    compliance="Should"
    cid="3785"
><![CDATA[<p>A Denial of Service response plan SHOULD include monitoring and use of:</p><ul>
<li>router and switch logging and flow data;</li>
<li>packet captures;</li>
<li>proxy and call manager logs and access control lists;</li>
<li>VTC and IPT aware firewalls and voice gateways;</li>
<li>network redundancy;</li>
<li>load balancing; </li>
<li>PSTN failover; and</li>
<li>alternative communication paths.</li>
</ul>]]></paragraph>
</block>
</subsection>
</section>
