Proprietary and confidential. © 2015 IntelePeer, Inc. All rights reserved.
Webinar: VoIP Security Best Practices
Shawn Augenstein
Common Threats
Best Practices
Importance of a SBC
Q&A
Getting Started
Introduction
Leveraging your
Service Provider
The following security issues and
attacks have been identified on many
standard VoIP implementations.
Common Security
Threats
1Call Interception
2Denial of
Service Attacks
3Exfiltration of Data
4Vishing
5Spamming over
Internet Telephony
(SPIT)
6Caller ID Spoofing 

Session
Manipulation
7
8
War Dialing

9
Registration
Hacking 

10Man-In-The-Middle
Attacks
Security Best Practices
P A S S W O R D S
Secure all VoIP devices that have a configuration interface
Join 2 or more words together
Include numbers and letters
Use minimum 8 characters, 12 characters is optimal
My Favorite movie line from Dirty Dancing is:
N o b o d y p u t s B a b y i n t h e c o r n e r
P A S S W O R D T I P S
Choose a line from your favorite song, film or play
Then use numbers, symbols and mixed-case letters to recreate it.
1987 is the year Dirty Dancing came out
My favorite actor is Patrick Swayze
NpBitC87P!
here is my password
v p n
Virtual Private
Network
remotelyaccessyournetwork
TRAFFIC ENCRYPTED
Pa tc hes
Keep systems up-to-date with operating system
patches.
New system VULNERABILITIES are being found
every week, so it is important to patch systems
REGULARLY.
Ma nagement
Interfaces
Open control ports are easily found.
If a system can be reconfigured remotely,
then a call can be rerouted to
international destinations or premium
numbers.
Services that allows a remote caller to get back to
the PBX “dial tone” has potential for making
unauthorized calls at your expense
Configure the access PIN on your smartphone.
Consider what services you want remote user to
access
Mobil e VoIP
& M o b i l i t y
S e rv ices
PBX Lock-
Down
VoIP phones can register with a PBX from
anywhere in the world
Limit registrations
Secure phones via password, IP address
or MAC (physical) address.
Deny access by default, and create
exceptions for authorized users.
Call Limits
Enable fraud protection
Uncharacteristic repeated calls to overseas
destinations
Automatically prevent calls until you authorize
the extra spend
Securing
Connections
from Dynamic
IP Addresses
Use a direct, dedicated connection for trunk/
interconnect connections with your provider.
Direct dedicated connections reduce the risk
of security threats.
Configure your SBC to allow only authorized
interconnect traffic to/from your trunk/
interconnect provider.
Session Border Controllers (SBCs) are the best edge device for
security in VoIP deployments.
full session state standard network firewall
same built in security
features
for voice traffic
SBC
Importance of a SBC
SBC Functions
Statistics
Security
Connectivity
QoS
Media Services
Securing VoIP Devices
Firewall
Keep software on PC and phone patched up
and up to date
Use best practices for passwords
Securing VoIP Devices
WHEN DISPOSING OF YOUR PHONE
Remove your username and passwords
Uninstall the application on soft phones
Complete a factory reset of phone to remove
directory and call records
Change your password on the VoIP service
Proprietary and confidential. © 2015 IntelePeer, Inc. All rights reserved.
Leverage your Provider
Intelepeer’s Communications as a Service platform
for voice and unified communications enablement
SIP provider since 2003
Certified with all leading UC and PBX systems


With IntelePeer you can be certain Security Best
Practices are followed.
service
provider
support
C a l l B a r r i n g
F r a u d A l e r t s
IntelePeer’s Fraud Prevention Efforts
T L S / S R T P
Q&A
Proprietary and confidential. © 2015 IntelePeer, Inc. All rights reserved.
www.intelepeer.com
177 Bovet Road Suite 400| San Mateo, CA | 94402 | T: +1.650.525.9200 | F: +1.650.287.2628

© 2015 IntelePeer
Contact us at
sales@intelepeer.com or
877-336-9171

SIP Security Best Practices

  • 1.
    Proprietary and confidential.© 2015 IntelePeer, Inc. All rights reserved. Webinar: VoIP Security Best Practices Shawn Augenstein
  • 2.
    Common Threats Best Practices Importanceof a SBC Q&A Getting Started Introduction Leveraging your Service Provider
  • 3.
    The following securityissues and attacks have been identified on many standard VoIP implementations. Common Security Threats
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
    P A SS W O R D S Secure all VoIP devices that have a configuration interface Join 2 or more words together Include numbers and letters Use minimum 8 characters, 12 characters is optimal
  • 16.
    My Favorite movieline from Dirty Dancing is: N o b o d y p u t s B a b y i n t h e c o r n e r P A S S W O R D T I P S Choose a line from your favorite song, film or play Then use numbers, symbols and mixed-case letters to recreate it. 1987 is the year Dirty Dancing came out My favorite actor is Patrick Swayze NpBitC87P! here is my password
  • 17.
    v p n VirtualPrivate Network remotelyaccessyournetwork TRAFFIC ENCRYPTED
  • 18.
    Pa tc hes Keepsystems up-to-date with operating system patches. New system VULNERABILITIES are being found every week, so it is important to patch systems REGULARLY.
  • 19.
    Ma nagement Interfaces Open controlports are easily found. If a system can be reconfigured remotely, then a call can be rerouted to international destinations or premium numbers.
  • 20.
    Services that allowsa remote caller to get back to the PBX “dial tone” has potential for making unauthorized calls at your expense Configure the access PIN on your smartphone. Consider what services you want remote user to access Mobil e VoIP & M o b i l i t y S e rv ices
  • 21.
    PBX Lock- Down VoIP phonescan register with a PBX from anywhere in the world Limit registrations Secure phones via password, IP address or MAC (physical) address. Deny access by default, and create exceptions for authorized users.
  • 22.
    Call Limits Enable fraudprotection Uncharacteristic repeated calls to overseas destinations Automatically prevent calls until you authorize the extra spend
  • 23.
    Securing Connections from Dynamic IP Addresses Usea direct, dedicated connection for trunk/ interconnect connections with your provider. Direct dedicated connections reduce the risk of security threats. Configure your SBC to allow only authorized interconnect traffic to/from your trunk/ interconnect provider.
  • 24.
    Session Border Controllers(SBCs) are the best edge device for security in VoIP deployments. full session state standard network firewall same built in security features for voice traffic SBC Importance of a SBC
  • 25.
  • 26.
    Securing VoIP Devices Firewall Keepsoftware on PC and phone patched up and up to date Use best practices for passwords
  • 27.
    Securing VoIP Devices WHENDISPOSING OF YOUR PHONE Remove your username and passwords Uninstall the application on soft phones Complete a factory reset of phone to remove directory and call records Change your password on the VoIP service
  • 28.
    Proprietary and confidential.© 2015 IntelePeer, Inc. All rights reserved. Leverage your Provider Intelepeer’s Communications as a Service platform for voice and unified communications enablement SIP provider since 2003 Certified with all leading UC and PBX systems 
 With IntelePeer you can be certain Security Best Practices are followed.
  • 29.
    service provider support C a ll B a r r i n g F r a u d A l e r t s IntelePeer’s Fraud Prevention Efforts T L S / S R T P
  • 30.
  • 31.
    Proprietary and confidential.© 2015 IntelePeer, Inc. All rights reserved. www.intelepeer.com 177 Bovet Road Suite 400| San Mateo, CA | 94402 | T: +1.650.525.9200 | F: +1.650.287.2628
 © 2015 IntelePeer Contact us at sales@intelepeer.com or 877-336-9171