<section title="19.5. Session Border Controllers"><subsection title="Objective"><paragraph
    title="19.5.1."


><![CDATA[<p>To ensure the use of Session Border Controllers (SBCs) is integrated with the agency’s security architecture and that use is consistent with other requirements for gateway security in this chapter.</p>]]></paragraph>
 </subsection>
<subsection title="Context"> <block title="Scope"><paragraph
    title="19.5.2."


><![CDATA[<p>This section encompasses the use of SBCs in Voice over Internet Protocol (VoIP) and Unified Communication (UC) networks within an agency.  It describes key risks and threats and provides guidance on the conceptual design of security for such systems.</p>]]></paragraph>
<paragraph
    title="19.5.3."


><![CDATA[<p>It is important to note that Service Providers generally have operational objectives different to those of the agency and typically they will:</p><ul>
<li>Design a highly operationally optimised network requiring minimal maintenance;</li>
<li>Provide resources, including SBCs, softswitches and media gateways that are shared between a number of customers (such as multi-tenanted data centres);</li>
<li>The standard model may not accommodate all unique agency or NZ Government requirements which will then require special consideration.</li>
</ul>]]></paragraph>
<paragraph
    title="19.5.4."


><![CDATA[<p>Reference should &nbsp;also be made to the following sections:</p><ul>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13958">Chapter 11 – Communications Systems and Devices</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Block-14707">Section 13.1.12 – Archiving</a>;</li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords;</a></li>
<li><a href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 - Video &amp; Telephony Conferencing and Internet Protocol Telephony</a>.</li>
</ul>]]></paragraph>
</block>
<block title="Definitions"><paragraph
    title="19.5.5."


><![CDATA[<p>A Session Border Controller (SBC) is a device (physical or virtual) used in IP networks to control and manage the signalling and media streams of real-time UC and VoIP connections.&nbsp; See also <a href="http://nzism.gcsb.govt.nz/ism-document#Section-16369">Section 18.3 – Video &amp; Telephony Conferencing and Internet Protocol Telephony</a>.&nbsp; It includes establishing, controlling, and terminating calls, interactive media communications or other VoIP connections.&nbsp; SBCs enable VoIP traffic to navigate gateways and firewalls and ensure interoperability between different SIP implementations.&nbsp; Careful selection of SBCs will provide such functionality as prevention of toll fraud, resistance to denial of service attacks and resistance to eavesdropping.</p>]]></paragraph>
<paragraph
    title="19.5.6."


><![CDATA[<p>Unified Communications (UC) is a term describing the integration of real-time and near real time communication and interaction services in an organisation or agency.&nbsp; UC may integrate several communication systems including unified messaging, collaboration, and interaction systems; real-time and near real-time communications; and transactional applications.</p>]]></paragraph>
<paragraph
    title="19.5.7."


><![CDATA[<p>UC may, for example, include services such as instant messaging (chat), presence information, voice, mobility, audio, web &amp; video conferencing, data sharing (such as interactive whiteboards), voicemail, e-mail, SMS and fax.  UC is not necessarily a single product, but more usually a set of products designed to provide a unified user-interface and user-experience across multiple devices and media-types.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Purpose"><paragraph
    title="19.5.8."


><![CDATA[<p>Traditional demarcation points, such as media gateways, are no longer natural boundaries.  Older firewall technology impacts the performance of communications systems, including VoIP and UC.  SBCs were introduced to improve performance and provide interoperability with real-time and near real-time communications.  They provide a new natural demarcation point.</p>]]></paragraph>
<paragraph
    title="19.5.9."


><![CDATA[<p>SBCs can provide a demarcation or normalisation point within the agency’s network, allow enforcement of agency specific security policies and provide a greater degree of accountability than the usual contract with service providers.</p>]]></paragraph>
 </subsection>
<subsection title="Risks and Threats"><paragraph
    title="19.5.10"


><![CDATA[<p>Risks and threats associated with the use of VoIP and UC include:</p><ul>
<li>Confidentiality (eavesdropping);</li>
<li>Integrity (enabling fraud and theft as well as compromising privacy); and</li>
<li>Availability (including Denial of Service [DoS or DDoS]).</li>
</ul>]]></paragraph>
 <block title="Confidentiality"><paragraph
    title="19.5.11."


><![CDATA[<p>There is a high likelihood of eavesdropping in VoIP systems. Traditional telephone systems require physical access to tap a line or compromise a PABX or switch.  In VoIP networks, virtual LAN environments can be exploited remotely to identify weaknesses within and between virtual LANs and gain access to valuable information.  Sniffing is another form of eavesdropping that involves capturing unencrypted voice traffic with malware or a specific VoIP sniffer tool.  In common with other Internet connected systems, adversary-in-the-middle exploits are also used to eavesdrop on both data and VoIP networks.</p>]]></paragraph>
</block>
<block title="Integrity"><paragraph
    title="19.5.12."


><![CDATA[<p>Exploits such as caller ID spoofing are relatively easy to execute and can be extremely costly to businesses.  Information from a stolen credit card or acquisition of other sensitive data, can compromise an employee’s caller ID, and have funds transferred while posing as the employee.  Cyber criminals can also change an employee’s registration information in order to eavesdrop on or intercept all incoming calls for that individual.</p>]]></paragraph>
<paragraph
    title="19.5.13."


><![CDATA[<p>Integrity compromise may include modification or insertion into UC.  As many UC elements, such as voicemail or email, may encompass electronic records as defined in legislation it is vital that these elements are preserved unaltered.</p>]]></paragraph>
</block>
<block title="Availability"><paragraph
    title="19.5.14."


><![CDATA[<p>Because VoIP and UC places high levels of demand on any network, managing Quality of Service (QoS), latency, jitter, packet loss and other service impediments are important aspects of availability.  In the event of major faults or outages, diversity and fault tolerance is vital for all key sites.  To enable failover, for example, where calls leave the customer network, call diversity and call failover are essential configuration elements.</p>]]></paragraph>
</block>
<block title="Denial of Service"><paragraph
    title="19.5.15."


><![CDATA[<p>Denial of Service (DoS) attacks abuse signalling protocols to deny availability of VoIP data and degrade performance.  If the telecommunications network is compromised, it is possible to also traverse systems to attack or infect the agency’s data networks and other systems.</p>]]></paragraph>
</block>
</subsection>
<subsection title="Common VoIP and UC Security Risks and Threats"><paragraph
    title="19.5.16."


><![CDATA[<p>Common VoIP and UC security risks and threats.</p><table class="table-main">
<tbody>
<tr>
<td>Risk</td>
<td>Typical Symptoms</td>
<td>Threat</td>
<td>Countermeasures</td>
</tr>
<tr>
<td><strong>Reconnaissance scan</strong></td>
<td>Address or port scan is used to footprint network topology</td>
<td>Targeted denial of service, fraud, theft</td>
<td>
<ul>
<li>Intrusion detection</li>
<li>Protection against registration floods</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Adversary in the middle</strong></td>
<td>Attacker intercepts session to impersonate(spoof) caller</td>
<td>Targeted denial of service, breach of privacy, fraud, theft</td>
<td>
<ul>
<li>TLS encryption for SIP with separate TLS certificates for SIP Service Providers</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Eavesdropping</strong></td>
<td>Attacker “sniffs” session for the purpose of social engineering</td>
<td>Breach of privacy, fraud, theft </td>
<td>
<ul>
<li>Intrusion detection</li>
<li>Encryption</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Session hijacking</strong></td>
<td>Attacker compromises valuable information by rerouting call </td>
<td>Breach of privacy, fraud, theft </td>
<td>
<ul>
<li>Intrusion detection</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Session overload</strong></td>
<td>Excessive signalling or media traffic(malicious, non-malicious) is experienced </td>
<td>Denial of service </td>
<td>
<ul>
<li> Protection against registration floods</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Protocol fuzzing</strong></td>
<td>Malformed packets, semantically or syntactically incorrect flows are encountered </td>
<td>Denial of service </td>
<td>
<ul>
<li>Malformed packet protection</li>
<li>Protocol anomaly protection</li>
<li>TCP reassembly for fragmented packet protection</li>
<li>Strict TCP validation to ensure TCP session state enforcement, validation of sequence and acknowledgement numbers, rejection of bad TCP flag combinations</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Media injection</strong></td>
<td>Attacker inserts unwanted or corrupted content into messages compromising packet/data stream integrity </td>
<td>Denial of service, fraud</td>
<td>
<ul>
<li>Application aware firewalls</li>
<li>Intrusion prevention /detection</li>
<li>Encryption</li>
</ul>
</td>
</tr>
<tr>
<td><strong>Toll Fraud</strong></td>
<td>Unexplained/unusual calling activity, increased costs/carrier notification/alert </td>
<td>Fraud, financial loss, breach of privacy, information loss </td>
<td>
<ul>
<li>Application aware firewalls</li>
<li>Intrusion prevention /detection</li>
<li>Encryption</li>
</ul>
</td>
</tr>
</tbody>
</table>]]></paragraph>
<paragraph
    title="19.5.17."


><![CDATA[<p>Encryption is discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15745">Chapter 17 - Cryptography</a>.</p>]]></paragraph>
 </subsection>
<subsection title="Product Selection"> <block title="Protection Profiles"><paragraph
    title="19.5.18."


><![CDATA[<p>One Protection Profile for SBCs has been published by NIAP (dated July 24, 2015 - see reference table).&nbsp; Several other Protection profiles (PPs) specifically for SBCs are in development but not yet published (as at September 2015).&nbsp; Gateway and other border control device PPs are used as surrogates in the interim.&nbsp; Refer to <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-14397">Chapter 12 – Product Security</a>.</p>]]></paragraph>
</block>
<block title="Desirable SBC Functionality"><paragraph
    title="19.5.19."


><![CDATA[<p>To manage risks and threats and to safeguard performance there are a number of desirable features in an SBC.  These include:</p><ul>
<li>Security – SBC DoS protection, access control, topology hiding, VPN separation, service infrastructure DoS prevention;</li>
<li>Encryption – Support for Suite B encryption;</li>
<li>Service Reach – surrogate registration IP PBX endpoints, SIP IMS-H.323 PBX IWF; VPN bridging;</li>
<li>SLA assurance – admission control; bandwidth per VPN &amp; site, session agent constraints, policy server; intra-VPN media release; QoS marking/mapping; QoS reporting;</li>
<li>Fraud and Revenue protection – bandwidth policing, QoS theft protection, accounting, session timers;</li>
<li>Regulatory compliance – provision of emergency service calls (111) &amp; lawful intercept.</li>
</ul>]]></paragraph>
</block>
</subsection>
<subsection title="Security Architecture"><paragraph
    title="19.5.20."


><![CDATA[<p>Typical use of session border controller in an agency gateway is illustrated in Figure 1 below:</p>
<p><img class="leftAlone" title="" src="assets/NZISM/19.5.20-agency-gateway-rotated.png" alt="19.5.20 Agency Gateway" width="600" height="424"></p>]]></paragraph>
 </subsection>
<subsection title="General References"><paragraph
    title="19.5.21."


><![CDATA[<p>Additional information on Session Border Controllers can be found in the following references:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 33%;"><strong>Source</strong></td>
</tr>
<tr>
<td><strong>NIST Special Publication 800-58, January 2005</strong></td>
<td><strong>Security Considerations for Voice Over IP Systems</strong></td>
<td style="text-align: center;">NIST</td>
<td style="width: 33%;"><a title="NIST SP 800-58" rel="noopener noreferrer" href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-58.pdf" target="_blank">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-58.pdf [PDF, 922 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Security Issues and Countermeasure for VoIP</strong></td>
<td style="text-align: center;">SANS</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.sans.org/white-papers/1701/" target="_blank">https://www.sans.org/white-papers/1701/</a></td>
</tr>
<tr>
<td><strong>Report Number: I332-016R-2005</strong></td>
<td><strong>Security Guidance for Deploying IP Telephony Systems Released: 14 February 2006</strong></td>
<td style="text-align: center;">Systems and Network Attack Center (SNAC) NSA</td>
<td style="width: 33%;">https://www.nsa.gov/ia/_files/voip/i332-016r-2005.pdf</td>
</tr>
<tr>
<td><strong>Report Number: I332-009R-2006</strong></td>
<td><strong>Recommended IP Telephony Architecture, Updated: 1May2006 Version1.0</strong></td>
<td style="text-align: center;">Systems and Network Attack Center (SNAC) NSA</td>
<td style="width: 33%;">https://www.nsa.gov/ia/_files/voip/I332-009R-2006.pdf</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Mobility Capability Package March 26 2012 - Secure VoIP Version 1.2</strong></td>
<td style="text-align: center;">NSA</td>
<td style="width: 33%;">https://www.nsa.gov/ia/_files/Mobility_Capability_Pkg_Vers_1_2.pdf</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Protecting Telephone-based Payment Card Data PCI Data Security Standard (PCI DSS) Version:&nbsp; 2.0, March 2011</strong></td>
<td style="text-align: center;">The&nbsp; PCI Security&nbsp; Standards&nbsp; Council (PCI SSC)</td>
<td style="width: 33%;"><a href="https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf">https://www.pcisecuritystandards.org/documents/protecting_telephone-based_payment_card_data.pdf [PDF, 888 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Understanding Voice over Internet Protocol (VoIP): 2006</strong></td>
<td style="text-align: center;">US-CERT</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf" target="_blank">https://www.us-cert.gov/sites/default/files/publications/understanding_voip.pdf [PDF, 83 KB]</a></td>
</tr>
<tr>
<td><strong>CNSS Instruction No. 5000 April 2007</strong></td>
<td><strong>Guidelines for Voice over Internet Protocol (VoIP) Computer Telephony</strong></td>
<td style="text-align: center;">Committee on National Security Systems</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.cnss.gov/CNSS/issuances/Instructions.cfm" target="_blank">https://www.cnss.gov/CNSS/issuances/Instructions.cfm</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Infrastructure qualified for Microsoft Lync</strong></td>
<td style="text-align: center;">Microsoft TechNet</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://technet.microsoft.com/en-us/office/dn788945.aspx" target="_blank">https://technet.microsoft.com/en-us/office/dn788945.aspx</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>A Guide to the Public Records Act</strong></td>
<td style="text-align: center;">Archives New Zealand</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://archives.govt.nz/manage-information/how-to-manage-your-information/key-obligations-and-the-standard/key-obligations-public-records-act-2005" target="_blank">https://archives.govt.nz/manage-information/how-to-manage-your-information/key-obligations-and-the-standard/key-obligations-public-records-act-2005</a></td>
</tr>
<tr>
<td><strong>Public Act 2002 No.35</strong></td>
<td><strong>Electronic Transactions Act 2002</strong></td>
<td style="text-align: center;">&nbsp;</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.legislation.govt.nz/act/public/2002/0035/latest/DLM154185.html" target="_blank">https://www.legislation.govt.nz/act/public/2002/0035/latest/DLM154185.html</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>Network Device Collaborative Protection Profile (NDcPP) Extended Package Session Border Controller, September 2016, version 1.1</strong></td>
<td style="text-align: center;">NIAP</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/MMO/PP/ep_sbc_v1.1.pdf" target="_blank">ep_sbc_v1.1.pdf (niap-ccevs.org)</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td>
<p>PP-Module for Voice and Video over IP (VVoIP),&nbsp;October 2020, v<strong><span>ersion 1.0</span></strong>&nbsp;</p>
</td>
<td style="text-align: center;">NIAP&nbsp;</td>
<td style="width: 33%;">
<p><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/MMO/PP/mod_vvoip_v1.0.pdf" target="_blank">mod_vvoip_v1.0.pdf (niap-ccevs.org)</a></p>
<p><a rel="noopener noreferrer" href="https://www.niap-ccevs.org/profile/Info.cfm?PPID=444&amp;id=444" target="_blank">NIAP (niap-ccevs.org)</a></p>
</td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014</strong></td>
<td style="text-align: center;">DHS</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf" target="_blank">https://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf [PDF, 586 KB]</a></td>
</tr>
<tr>
<td><strong>&nbsp;</strong></td>
<td><strong>2015 Global Fraud Loss Survey</strong></td>
<td style="text-align: center;">CFCA</td>
<td style="width: 33%;"><a rel="noopener noreferrer" href="https://cfca.org/fraudloss-survey/" target="_blank">https://cfca.org/fraudloss-survey/</a><br><a href="http://www.dhs.gov/sites/default/files/publications/4300A%20Handbook%20Attachment%20Q5%20-%20Voice%20over%20IP.pdf"></a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Media Technical References"><paragraph
    title="19.5.22."


><![CDATA[<p>Media technical references are listed below:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td><strong>Source</strong></td>
</tr>
<tr>
<td><strong>RFC 2833</strong></td>
<td><strong>RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="RTP Payload for DTMF Digits, Telephony Tones and Telephony Signals" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2833" target="_blank">https://datatracker.ietf.org/doc/html/rfc2833</a></td>
</tr>
<tr>
<td><strong>RFC 3313</strong></td>
<td><strong>Private Session Initiation Protocol (SIP) Extensions for Media Authorization</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Private Session Initiation Protocol (SIP) Extensions for Media Authorization" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3313" target="_blank">https://datatracker.ietf.org/doc/html/rfc3313</a></td>
</tr>
<tr>
<td><strong>RFC 3550</strong></td>
<td><strong>RTP: A Transport Protocol for Real-Time Applications</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="RTP: A Transport Protocol for Real-Time Applications" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3550" target="_blank">https://datatracker.ietf.org/doc/html/rfc3550</a></td>
</tr>
<tr>
<td><strong>RFC 3685</strong></td>
<td><strong>Real Time Control Protocol (RTCP) attribute in Session Description Protocol (SDP)</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="SIEVE Email Filtering: Spamtest and VirusTest Extensions" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3685" target="_blank">https://datatracker.ietf.org/doc/html/rfc3685</a></td>
</tr>
<tr>
<td><strong>RFC 3362</strong></td>
<td><strong>Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration</strong></td>
<td style="text-align: center;">IETF</td>
<td><a title="Real-time Facsimile (T.38) - image/t38 MIME Sub-type Registration" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3362" target="_blank">https://datatracker.ietf.org/doc/html/rfc3362</a></td>
</tr>
<tr>
<td><strong>T.38 (09/2010)</strong></td>
<td><strong>Procedures for real-time Group 3 facsimile communication over IP networks</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-T.38/e" target="_blank">https://www.itu.int/rec/T-REC-T.38/e</a></td>
</tr>
<tr>
<td><strong>V.150.1 (01/2003)</strong></td>
<td>
<p><strong>Modem-over-IP networks: Procedures for the</strong></p>
<strong>end-to-end connection of V-series DCEs</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-V.150.1-200301-I/en" target="_blank">https://www.itu.int/rec/T-REC-V.150.1-200301-I/en</a></td>
</tr>
<tr>
<td><strong>G.711</strong></td>
<td><strong>Pulse code modulation (PCM) of voice frequencies</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-G.711/" target="_blank">https://www.itu.int/rec/T-REC-G.711/</a></td>
</tr>
<tr>
<td><strong>G.726</strong></td>
<td><strong>40, 32, 24, 16 kbit/s adaptive differential pulse code modulation (ADPCM)</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-G.726/e" target="_blank">https://www.itu.int/rec/T-REC-G.726/e</a></td>
</tr>
<tr>
<td><strong>G. 729 (06/2012)&nbsp;</strong></td>
<td><strong>Coding of speech at 8 kbit/s using conjugate-structure algebraic-code-excited linear-prediction (CS-ACELP)</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-G.729/e" target="_blank">https://www.itu.int/rec/T-REC-G.729/e</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Signalling Technical References"><paragraph
    title="19.5.23."


><![CDATA[<p>Signalling technical references are listed below:</p><table class="table-main">
<tbody>
<tr>
<td><strong>Reference</strong></td>
<td><strong>Title</strong></td>
<td><strong>Publisher</strong></td>
<td style="width: 25%;"><strong>Source</strong></td>
</tr>
<tr>
<td><strong>RFC 2705&nbsp;</strong></td>
<td><strong>Media Gateway Control Protocol (MGCP) Version 1.0</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Media Gateway Control Protocol (MGCP) Version 1.0" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2705" target="_blank">https://datatracker.ietf.org/doc/html/rfc2705</a></td>
</tr>
<tr>
<td><strong>RFC 3525</strong></td>
<td><strong>Gateway Control Protocol Version 1.0</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Gateway Control Protocol Version 1" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3525" target="_blank">https://datatracker.ietf.org/doc/html/rfc3525</a></td>
</tr>
<tr>
<td><strong>RFC 3261</strong></td>
<td><strong>SIP: Session Initiation Protocol</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="SIP: Session Initiation Protocol" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3261" target="_blank">https://datatracker.ietf.org/doc/html/rfc3261</a></td>
</tr>
<tr>
<td><strong>RFC 3263</strong></td>
<td><strong>Locating SIP Servers</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Session Initiation Protocol (SIP): Locating SIP Servers" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3263" target="_blank">https://datatracker.ietf.org/doc/html/rfc3263</a></td>
</tr>
<tr>
<td><strong>RFC 4028</strong></td>
<td><strong>SIP Session Timer</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc4028" target="_blank">https://datatracker.ietf.org/doc/html/rfc4028</a></td>
</tr>
<tr>
<td><strong>RFC 3966</strong></td>
<td><strong>The tel URI for Telephone Numbers</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="The tel URI for Telephone Numbers" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3966" target="_blank">https://datatracker.ietf.org/doc/html/rfc3966</a></td>
</tr>
<tr>
<td><strong>RFC 3924</strong></td>
<td><strong>Cisco Architecture for Lawful Intercept in IP Networks</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Cisco Architecture for Lawful Intercept in IP Networks" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3924" target="_blank">https://datatracker.ietf.org/doc/html/rfc3924</a></td>
</tr>
<tr>
<td><strong>RFC 2327</strong></td>
<td><strong>Session Description Protocol</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;">
<p><a title="SDP: Session Description Protocol" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc2327" target="_blank">https://datatracker.ietf.org/doc/html/rfc2327</a></p>
</td>
</tr>
<tr>
<td><strong>RFC 3025</strong></td>
<td><strong>Gateway Control Protocol Version 1, June 2003</strong></td>
<td style="text-align: center;">IEFT</td>
<td style="width: 25%;"><a title="Mobile IP Vendor/Organization-Specific Extensions" rel="noopener noreferrer" href="https://datatracker.ietf.org/doc/html/rfc3025" target="_blank">https://datatracker.ietf.org/doc/html/rfc3025</a></td>
</tr>
<tr>
<td><strong>H.248 (03/2013)</strong></td>
<td><strong>Media Gateway Control (Megaco): Version 3</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-H.248.1/en" target="_blank">https://www.itu.int/rec/T-REC-H.248.1/en</a></td>
</tr>
<tr>
<td><strong>H.323 (12/2009)</strong></td>
<td><strong>Packet-based multimedia communications systems</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.itu.int/rec/T-REC-H.323/en/" target="_blank">https://www.itu.int/rec/T-REC-H.323/en/</a></td>
</tr>
<tr>
<td><strong>H.450</strong></td>
<td><strong>Supplementary Services for H.323</strong></td>
<td style="text-align: center;">International Telecommunication Union</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.itu.int/en/Pages/default.aspx" target="_blank">https://www.itu.int/en/Pages/default.aspx</a></td>
</tr>
<tr>
<td><strong>MSF Technical Report MSF-TR-QoS-001-FINAL</strong></td>
<td><strong>Quality of Service for next generation VoIP networks framework</strong></td>
<td style="text-align: center;">Multiservice Switching Forum (MSF)</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="http://www.recursosvoip.com/docs/english/MSF-TR-QoS-001-FINAL.pdf" target="_blank">http://www.recursosvoip.com/docs/english/MSF-TR-QoS-001-FINAL.pdf [PDF, 778 KB]</a></td>
</tr>
<tr>
<td><strong>ETSI TS 129 305 V8.0.0 (2009-01)</strong></td>
<td><strong>Universal Mobile Telecommunications System (UMTS); LTE; InterWorking Function (IWF) between MAP based and Diameter based interfaces.</strong></td>
<td style="text-align: center;">European Telecommunications Standards Institute</td>
<td style="width: 25%;"><a rel="noopener noreferrer" href="https://www.etsi.org/deliver/etsi_ts/129300_129399/129305/08.00.00_60/ts_129305v080000p.pdf" target="_blank">https://www.etsi.org/deliver/etsi_ts/129300_129399/129305/08.00.00_60/ts_129305v080000p.pdf [PDF, 425 KB]</a></td>
</tr>
</tbody>
</table>]]></paragraph>
 </subsection>
<subsection title="Rationale &amp; Controls"> <block title="Risk Assessment"><paragraph
    title="19.5.24.R.01."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>The adoption of Voice over Internet Protocol (VoIP) and Unified Communication (UC) networks will introduce a range of technology risks <em>in addition</em> to the technology and systems risks that already exist for agency systems.  It is vital that these risks are identified and assessed in order to design a robust security architecture and to select appropriate controls and countermeasures.</p>]]></paragraph>
<paragraph
    title="19.5.24.R.02."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>The availability of agency systems, business functionality and any customer or client online services, is subject to further risks in an outsourced environment.  A risk assessment will include consideration of business requirements on availability in a VoIP and UC environment.</p>]]></paragraph>
<paragraph
    title="19.5.24.R.03."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>Risks to business functionality may include service outages, such as communications, data centre power, backup and other failures or interruptions.  Entity failures such as the merger, acquisition or liquidation of the service provider may also present a significant business risk to availability.</p>]]></paragraph>
<paragraph
    title="19.5.24.R.04."

    tags="Technical,Risk Assessment,Gateway Security"


><![CDATA[<p>Testing is a valuable tool when assessing risk.  A UC environment with complex communications streams can provide opportunities for exploitation, especially where the configuration is weak or has itself been compromised.  One of the fundamental tools is penetration testing.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.01."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4703"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST conduct a comprehensive risk assessment <em>before</em> implementation or adoption.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.02."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4705"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST consider the risks to the availability of systems and information in their design of VoIP and UC systems architecture, fault tolerance, fail over and supporting controls and governance processes.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.03."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4706"
><![CDATA[<p>Agencies MUST ensure risks for any VoIP or UC service adopted are understood and formally accepted by the agency’s Accreditation Authority as part of the Certification and Accreditation process (See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>).</p>]]></paragraph>
<paragraph
    title="19.5.24.C.04."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4707"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST determine where the responsibility (agency or VoIP and UC service provider) for implementing, managing and maintaining controls lies in accordance with agreed trust boundaries.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.05."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications, Restricted/Sensitive"
    compliance="Must"
    cid="4708"
><![CDATA[<p>Any contracts for the provision of VoIP or UC services MUST include service level, availability, recoverability and restoration provisions as formally determined by business requirements.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.06."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4709"
><![CDATA[<p>Agencies MUST ensure contracts with VoIP or UC service providers include provisions to manage risks associated with the merger, acquisition, liquidation or bankruptcy of the service provider and any subsequent termination of VoIP or UC services.</p>]]></paragraph>
<paragraph
    title="19.5.24.C.07."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4710"
><![CDATA[<p>Agencies procuring or using VoIP or UC services to be used by multiple agencies MUST ensure all interested parties formally agree to the risks, controls and any residual risks of such VoIP and UC services. &nbsp;The lead agency normally has this responsibility (see <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12117">Chapter 2 - Information Security services within Government</a> and <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-12459">Chapter 4 - System Certification and Accreditation</a>).</p>]]></paragraph>
<paragraph
    title="19.5.24.C.08."

    tags="Technical,Risk Assessment,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4711"
><![CDATA[<p>Agencies SHOULD consider the use of assessment tools, such as penetration testing, when undertaking the risk assessment.</p>]]></paragraph>
</block>
<block title="Non-Agency Networks"><paragraph
    title="19.5.25.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Networks furnished by a service provider are invariably shared networks.  Much of the security configuration is designed to maximise operational efficiency of the Service Providers network.  Any agency specific security requirements may attract additional cost.</p>]]></paragraph>
<paragraph
    title="19.5.25.R.02."

    tags="Technical,Gateway Security"


><![CDATA[<p>It is preferable to maintain an agency designed and controlled gateway to ensure security requirements are properly accommodated.  The use of SBCs should be carefully considered in order to maximise efficiency consistent with security requirements.</p>]]></paragraph>
<paragraph
    title="19.5.25.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4715"
><![CDATA[<p>Agencies MUST follow the gateway requirements described in <a title="Gateway Security" href="http://nzism.gcsb.govt.nz/ism-document#Chapter-16567">Chapter 19 - Gateway Security</a>.</p>]]></paragraph>
</block>
<block title="Security Architecture and Configuration"><paragraph
    title="19.5.26.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>Trust boundaries must be defined to assist in determining effective controls and where these controls can best be applied. &nbsp;Trust zones and trust boundaries are discussed in <a href="http://nzism.gcsb.govt.nz/ism-document#Paragraph-17223">22.1.3</a>. &nbsp;The use of SBCs will assist with the definition of trust boundaries and allow the segregation of UC and normal data.</p>]]></paragraph>
<paragraph
    title="19.5.26.R.02."

    tags="Technical,Gateway Security"


><![CDATA[<p>The threat model for IP is well understood.  Data packets can be intercepted or eavesdropped anywhere along the transmission path including the corporate network, by the internet service provider and along the backbone.  The prevalence and ease of packet sniffing and other techniques for capturing packets on an IP based network increases this threat level.  VoIP Encryption is an effective means of mitigating this threat.</p>]]></paragraph>
<paragraph
    title="19.5.26.R.03."

    tags="Technical,Gateway Security"


><![CDATA[<p>The nature of traffic through an SBC is an important factor in determining the type and configuration of the SBC.  This also plays an important role in determining the resilience of the system.  Systems may require high availability (HA), depending on business requirements for availability and continuity of service.  The use of split trunks for HA normal traffic may provide resilience at reduced costs.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4720"
><![CDATA[<p>Agencies intending to adopt VoIP or UC technologies or services MUST determine trust boundaries <em>before</em> implementation.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.02."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4721"
><![CDATA[<p>Updates to the SBC and related devices MUST be verified by the administrator to ensure they are obtained from a trusted source and are unaltered.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.03."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4722"
><![CDATA[<p>Agencies MUST include defence mechanisms for the Common VoIP and UC Security Risks and Threats described in <a title="Risks and threats" href="http://nzism.gcsb.govt.nz/ism-document#SubSection-16750">19.5.10</a>.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.04."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4723"
><![CDATA[<p>Agency networks MUST ensure the SBC includes a topology hiding capability.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.05."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4724"
><![CDATA[<p>Agency networks MUST consider the use of call diversity and call failover configurations.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.06."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4725"
><![CDATA[<p>In a virtualised environment, agencies MUST ensure any data contained in a protected resource is deleted or not available when the virtual resource is reallocated.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.07."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4726"
><![CDATA[<p>Agencies SHOULD conduct a traffic analysis to ensure the agency’s network and architecture is capable of supporting all VoIP, media and UC traffic.  The traffic analysis SHOULD also determine any high availability requirements.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.08."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4727"
><![CDATA[<p>Agencies SHOULD design a security and gateway architecture that segregates UC and normal data traffic. &nbsp;Firewall requirements (<a href="http://nzism.gcsb.govt.nz/ism-document#Section-16688">Section 19.3 - Firewalls</a>) continue to apply to data traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.09."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4728"
><![CDATA[<p>In a virtualised environment, agencies SHOULD create separate virtual LANs for data traffic and UC traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.10."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4729"
><![CDATA[<p>In a non-virtualised environment, agencies SHOULD create separate LANs for data traffic and UC traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.11."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4730"
><![CDATA[<p>Agency networks SHOULD use encryption internally on VoIP and unified communications traffic.</p>]]></paragraph>
<paragraph
    title="19.5.26.C.12."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4731"
><![CDATA[<p>Agency networks SHOULD ensure intrusion prevention systems and firewalls are VoIP-aware.<br><br></p>]]></paragraph>
</block>
<block title="Access Control"><paragraph
    title="19.5.27.R.01."

    tags="Technical,Access Control,Gateway Security"


><![CDATA[<p>Network access control and password requirements are described in <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 - Access control and passwords</a>, in particular <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">Section 16.6 – Event Logging and Auditing</a>. &nbsp;Event logging helps improve the security posture of a system by increasing the accountability of all user actions, thereby improving the chances that malicious behaviour will be detected and assist in the investigation of incidents. &nbsp;A fundamental of access control is to manage access rights including physical access, file system and data access permissions and programme execution permissions. &nbsp;In addition, access control provides a record of usage in the event of an incident. &nbsp;Retention of records and archiving is discussed in&nbsp;<a href="http://nzism.gcsb.govt.nz/ism-document#Block-14707">13.1.12 - Archiving</a>.</p>]]></paragraph>
<paragraph
    title="19.5.27.R.02."

    tags="Technical,Access Control,Gateway Security"


><![CDATA[<p>Similar requirements apply to VoIP and UC networks as these are also IP based.  This will include any service enabled as part of the UC environment, such as Chat, IM, video and teleconferencing.</p>]]></paragraph>
<paragraph
    title="19.5.27.R.03."

    tags="Technical,Access Control,Gateway Security"


><![CDATA[<p>There may be special cases, such as a 24x7 operations centre, where VoIP phones are shared by several duty officers on a shift basis.  Workloads may require a number of duty personnel at any one time.  In such cases it may be impractical to allocate individual VoIP or UC UserID and passwords.  The risks in such cases must be clearly identified and compensating controls applied to ensure traceability in the event of fault finding or an incident.  Examples of compensating controls include physical access control, CCTV, and duty registers.  Identification of shared facilities is important and may comprise a UserID such as “Duty Officer”, SOC, or agency name in a multi-agency facility.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.01."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4737"
><![CDATA[<p>Any shared facilities MUST be clearly identifiable both physically and logically.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.02."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4738"
><![CDATA[<p>Agencies MUST provide a protected communication channel for administrators, and authorised systems personnel.  Such communication MUST be logged.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.03."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4739"
><![CDATA[<p>Agencies MUST ensure administrative access to the SBC is available only through a trusted LAN and secure communication path.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.04."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4740"
><![CDATA[<p>Access control and password requirements SHOULD apply to VoIP and UC networks in all cases where individual access is granted.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.05."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4741"
><![CDATA[<p>In special cases where individual UserIDs and Passwords are impractical, a risk assessment SHOULD be completed and compensating controls applied.</p>]]></paragraph>
<paragraph
    title="19.5.27.C.06."

    tags="Technical,Access Control,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4742"
><![CDATA[<p>Event logs covering all VoIP and UC services SHOULD be maintained in accordance with the requirements of the NZISM. See sections <a href="http://nzism.gcsb.govt.nz/ism-document#Section-15629">16.6 - Event Logging and Auditing</a> and <a title="Archiving" href="http://nzism.gcsb.govt.nz/ism-document#Block-14707">13.1.12 - Archiving</a>.</p>]]></paragraph>
</block>
<block title="Incident Handling and Management"><paragraph
    title="19.5.28.R.01."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Service providers may not provide the same level of incident identification and management as provided by agencies.  In some cases, these services will attract additional costs.  Careful management of contracts is required to ensure agency requirements for incident detection and management are fully met when adopting VoIP and UC services.</p>]]></paragraph>
<paragraph
    title="19.5.28.R.02."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Deny listing denies calls to specific numbers, range of numbers, or countries.  Allow listing allows calls to numbers, range of numbers, or countries.  A combination of deny and allow listing enables a flexible method of preventing call fraud (hijacking and “call pumping”), for example, by allowing calls to a specific number within a country on a deny list.</p>]]></paragraph>
<paragraph
    title="19.5.28.R.03."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Call Rate Limiting allows the restriction of outbound call volumes to specific numbers, range of numbers or countries.  This is a useful mitigation for “traffic pumping” call fraud schemes.  Call rate limiting also allows temporary limits to be placed on call from or to particular destinations while a security incident is investigated.</p>]]></paragraph>
<paragraph
    title="19.5.28.R.04."

    tags="Technical,Incident Management,Gateway Security"


><![CDATA[<p>Call Redirection enables the transfer of blocked calls to another destination including via monitoring and recording systems.  Blocked calls may be dropped or a message played indicating, for example, that calls cannot be connected.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.01."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4748"
><![CDATA[<p>Agencies MUST include incident handling and management services in contracts with service providers.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.02."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4749"
><![CDATA[<p>Agencies MUST develop and implement incident identification and management processes in accordance with this manual (See <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13001">Chapter 6 – Information Security Monitoring</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13097">Chapter 7 – Information Security Incidents</a>, <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-13360">Chapter 9 – Personnel Security </a>and <a href="http://nzism.gcsb.govt.nz/ism-document#Chapter-15348">Chapter 16 – Access control and passwords</a>).</p>]]></paragraph>
<paragraph
    title="19.5.28.C.03."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4750"
><![CDATA[<p>Agencies SHOULD implement fraud detection monitoring to identify suspicious activity and provide alerting so that remedial action can be taken.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.04."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4751"
><![CDATA[<p>Agencies SHOULD regularly review call detail records for patterns of service theft.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.05."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4752"
><![CDATA[<p>Agencies SHOULD consider the use of allow and deny listing to manage fraudulent calls to known fraudulent call destinations.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.06."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4753"
><![CDATA[<p>Agencies SHOULD consider the use of call rate limiting as a fraud mitigation measure.</p>]]></paragraph>
<paragraph
    title="19.5.28.C.07."

    tags="Technical,Incident Management,Gateway Security"


    classification="All Classifications"
    compliance="Should"
    cid="4755"
><![CDATA[<p>Agencies SHOULD consider the use of call redirection to manage blocked calls.</p>]]></paragraph>
</block>
<block title="User Awareness and Training"><paragraph
    title="19.5.29.R.01."

    tags="Technical,Gateway Security"


><![CDATA[<p>The introduction of VoIP and UC services will introduce change to the appearance and functionality of systems, how users access agency systems and types of user support. It is essential that users are aware of information security and privacy concepts and risks associated with the services they use.</p><p>Support provided by the VoIP and UC service provider may attract additional charges.</p>]]></paragraph>
<paragraph
    title="19.5.29.C.01."

    tags="Technical,Gateway Security"


    classification="All Classifications"
    compliance="Must"
    cid="4758"
><![CDATA[<p>Agencies MUST develop and implement user awareness and training programmes to support and enable safe use of VoIP and UC services (See <a href="http://nzism.gcsb.govt.nz/ism-document#Section-13361">Section 9.1 – Information Security Awareness and Training</a>).</p>]]></paragraph>
</block>
</subsection>
</section>
