Unified communications (UC) has become a vital application for most organisations who want to streamline their communications in a cost-effective manner. From a security standpoint we are all too aware of the constant news about web and email security incidents, but we hear little about unifi ed communications. While unifi ed communications security incidents aren’t dominating headlines, the potential for vital corporate data to slip out via this technology solution is very real.
UC is probably the third-most vulnerable application from a security standpoint, after web and email – and for many of the same reasons, most of which have to do with broader network security policies. The real threat surrounding UC is that of sensitive information leaking out of the company, accidentally or otherwise, through common UC applications such as instant messaging and conferencing where we tend to share information via a combination of video and voice, which traverse the network.
UC security threats fall into three buckets. First, UC applications offer a good channel for individuals to share information, either covertly or by accident. For example, there have been many recorded instances of companies that have unwittingly shared, via VoIP eavesdropping attacks, video fi les or presentations that were not ready for public consumption.
In other cases, individuals have circumvented the security policies applied to email because the same policies had not been applied to the UC applications; for example employees sending out credit card details via an instant messaging application because their email solution has a rule that blocks outgoing confi dential information.
Secondly, albeit less common, wrongdoers can co-opt an employee’s internal caller identity and use it to phish for information or to make unauthorised outbound calls. This is known as a call-hijacking scheme, and it’s something that small businesses using hosted services should be especially diligent about watching. Not only does call-hijacking cost money; it can also be responsible for damaging a company’s reputation if someone is using the caller identifi cation associated with its IP phone solution to make unsolicited calls.
Lastly, the hardware associated with UC is inherently insecure. IP phones are insecure networkattached hosts that are easily discovered, have no HIPS or antivirus, usually rely on a browser interface that does use HTTPS, and they use unprotected TFTP servers for downloading configurations. So what can a technology solution provider do to maintain a customer’s UC security?
Focusing on core network security solutions and processes is the key to maintaining UC security and reducing the chances that breaches will occur. Protecting corporate UC and collaboration sessions via a virtual private network is one best practice, as running sessions over VPN is inherently more secure. We are also seeing encryption and authentication becoming more mainstream in vendor solutions, although the challenge here is to ensure that there is minimal latency to the UC sessions.
As is the case when we talk about network security, enforcing a strong strategy for role-based authentication and access control is a key security consideration that needs to be adopted by organisations who have invested in a UC strategy. It’s important to apply the same policies for audit and archiving of corporate information to UC conversations as you would to any other network application.
In the end, although specific technologies like SIP proxies and firewalls are useful in securing unified communications, it is more important to take the deployment of unified communications as yet another trigger to a well-rounded, multi-level and multi-layer defence strategy for security across the enterprise infrastructure