Introduction |
|
xix | |
|
Chapter 1 The Importance of Practical UC Security |
|
|
1 | (14) |
|
Identifying the Threat Landscape |
|
|
2 | (2) |
|
|
4 | (1) |
|
Balancing Operations and Security |
|
|
5 | (2) |
|
|
7 | (3) |
|
Visibility and Management |
|
|
10 | (1) |
|
Introduction to ACME: Case Study |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (1) |
|
Chapter 2 Physical Security and Life Safety |
|
|
15 | (40) |
|
Introduction to Physical Security and Life Safety |
|
|
15 | (13) |
|
A Physical Security Methodology |
|
|
17 | (1) |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
Practical Physical Security for Your UC Environment |
|
|
22 | (1) |
|
Physical Security for the Data Center |
|
|
22 | (2) |
|
Power Plant Considerations |
|
|
24 | (1) |
|
|
25 | (1) |
|
Cable Plant Considerations |
|
|
26 | (2) |
|
Life and Safety Considerations |
|
|
28 | (25) |
|
Introduction to Enhanced 911 |
|
|
28 | (1) |
|
|
29 | (1) |
|
Regulatory Considerations |
|
|
30 | (1) |
|
Native E911 Call Routing with Cisco Unified CM |
|
|
31 | (3) |
|
E911 Call Routing with Cisco Emergency Responder |
|
|
34 | (1) |
|
E911 Call Flow with Cisco Emergency Responder |
|
|
35 | (1) |
|
|
36 | (2) |
|
ERL Creation and Network Discovery |
|
|
38 | (5) |
|
Call Routing Considerations |
|
|
43 | (4) |
|
|
47 | (2) |
|
Management, Verification, and Compliance |
|
|
49 | (2) |
|
Additional Life and Safety Solutions |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
Chapter 3 Security Through Network Fundamentals |
|
|
55 | (34) |
|
Introduction to Network Security |
|
|
57 | (1) |
|
|
58 | (1) |
|
|
59 | (5) |
|
|
64 | (11) |
|
|
65 | (2) |
|
|
67 | (5) |
|
MAC Authentication Bypass (MAB) and Network Access Control (NAC) |
|
|
72 | (3) |
|
|
75 | (11) |
|
|
77 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
80 | (3) |
|
|
83 | (1) |
|
Firewalls and Access Controls |
|
|
84 | (2) |
|
|
86 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
Chapter 4 Maintaining Security Across UC Deployment Types |
|
|
89 | (36) |
|
Common Enterprise Collaboration Deployment Models and Security Considerations |
|
|
90 | (6) |
|
An Overview of How to Secure Cluster Communications |
|
|
96 | (4) |
|
NTP Authentication Enablement and Verification |
|
|
100 | (3) |
|
Securing Intra-Cluster Signaling and Traffic |
|
|
103 | (7) |
|
Securing the Signaling Traffic to IOS Voice and Analog Gateways |
|
|
110 | (8) |
|
Securing the Integration with Cisco Emergency Responder |
|
|
118 | (5) |
|
Enable Cisco Emergency Responder to Use Secure JTAPI |
|
|
119 | (4) |
|
|
123 | (1) |
|
|
124 | (1) |
|
Chapter 5 Hardening the Core Cisco UC Appliance Operating Systems |
|
|
125 | (36) |
|
Defining the Core UC Applications |
|
|
126 | (12) |
|
The UC Appliance Is Not a Standard Linux Server |
|
|
127 | (7) |
|
Restricted and Unrestricted Versions of UC Software |
|
|
134 | (2) |
|
Standard Practices for Patch/Version Management |
|
|
136 | (1) |
|
How Root Access Is Granted |
|
|
137 | (1) |
|
Hardening the Voice Operating System |
|
|
138 | (9) |
|
Enabling Federal Information Processing Standard (FIPS) 140-2 |
|
|
139 | (4) |
|
Enabling Enhanced Security Mode |
|
|
143 | (1) |
|
Enabling Common Criteria ISO/IEC 15408 Compliance |
|
|
144 | (3) |
|
Summarizing FIPS 140-2 / Enhanced Security Mode / Common Criteria |
|
|
147 | (1) |
|
Performing OS Lockdown via CLI |
|
|
147 | (12) |
|
Process to Change Passwords for OS/GUI/Database |
|
|
148 | (3) |
|
Configuring Password Aging |
|
|
151 | (1) |
|
Enabling Password Complexity |
|
|
152 | (3) |
|
Activating Account Locking and Inactive Account Disablement |
|
|
155 | (2) |
|
Account Recovery Procedures |
|
|
157 | (2) |
|
|
159 | (1) |
|
|
159 | (2) |
|
Chapter 6 Core Cisco UC Application Lockdown |
|
|
161 | (56) |
|
Types of Users in Cisco Unified Communications Manager and Cisco Unity Connection |
|
|
162 | (1) |
|
Strengthening Local User Account Controls |
|
|
163 | (12) |
|
Creating User Account Control Policies on Unified CM and Unity Connection |
|
|
164 | (6) |
|
Using and Working with Cisco Unified CM Access Control Groups |
|
|
170 | (5) |
|
Assigning User Roles and Credential Policies to Users |
|
|
175 | (1) |
|
Importing End Users from a LDAP Directory |
|
|
175 | (11) |
|
Enabling the Required Services for Importing End Users Using LDAP |
|
|
176 | (1) |
|
LDAP Directory Configuration and Overview |
|
|
177 | (7) |
|
Configuring LDAP Authentication for Imported End Users |
|
|
184 | (2) |
|
Using Single Sign-On to Simplify the Login Experience |
|
|
186 | (11) |
|
Intro to Security Assertion Markup Language (SAML) |
|
|
186 | (5) |
|
Configuring Cisco Unified CM for SAML SSO |
|
|
191 | (6) |
|
Synching End Users Between Unity Connection and Unified CM Using Universal PIN |
|
|
197 | (4) |
|
Credential Change Service |
|
|
200 | (1) |
|
|
201 | (3) |
|
|
201 | (1) |
|
|
202 | (2) |
|
Enabling System Monitoring Using SNMP and Syslog |
|
|
204 | (9) |
|
Configurating and Using SNMP for System Monitoring |
|
|
204 | (5) |
|
Defining the Alerting Types and Configuring Logging |
|
|
209 | (1) |
|
|
209 | (2) |
|
|
211 | (2) |
|
Disaster Recovery Planning and Best Practices |
|
|
213 | (1) |
|
|
214 | (1) |
|
|
214 | (3) |
|
Chapter 7 Encrypting Media and Signaling |
|
|
217 | (56) |
|
Licensing (Encryption License) and Allowing Export Restrictions Requirements |
|
|
218 | (4) |
|
FIPS Considerations When Enabling Secure Signaling and Media Encryption |
|
|
222 | (1) |
|
Public Key Infrastructure Overview |
|
|
222 | (15) |
|
Utilizing Public Key Infrastructure with Cisco Unified Communications |
|
|
229 | (4) |
|
Next-Generation Encryption Support Using Elliptical Curve Cryptography |
|
|
233 | (2) |
|
IP Phone Certificates Types |
|
|
235 | (2) |
|
|
237 | (2) |
|
Overview of the Endpoint Registration Process |
|
|
239 | (25) |
|
|
239 | (6) |
|
What It Means to Place a Unified CM Cluster into Mixed Mode |
|
|
245 | (2) |
|
|
247 | (3) |
|
Using SIP OAuth to Secure Signaling and Encryption |
|
|
250 | (1) |
|
Why Is OAuth Used to Secure Signaling and Media? |
|
|
251 | (1) |
|
Using SAML for Authentication with OAuth |
|
|
252 | (3) |
|
Utilizing OAuth for Authorization |
|
|
255 | (3) |
|
Enabling OAuth on Unified CM and Unity Connection |
|
|
258 | (3) |
|
Configuring Secure Phone Profiles to Enable Secure Signaling and Media Encryption |
|
|
261 | (3) |
|
Applying the Secure Phone Profiles and LSC to the Phones |
|
|
264 | (7) |
|
|
271 | (1) |
|
|
271 | (2) |
|
Chapter 8 Securing Cisco Unified Communications Manager (Cisco) |
|
|
273 | (32) |
|
|
274 | (2) |
|
Where to Configure the Settings |
|
|
274 | (1) |
|
Features and Services to Consider |
|
|
275 | (1) |
|
|
276 | (22) |
|
|
278 | (1) |
|
Secure Conferencing Using Hardware-Based DSPs |
|
|
278 | (12) |
|
Secure Conferencing Using Cisco Meeting Server |
|
|
290 | (7) |
|
Meet-Me Secure Conferencing |
|
|
297 | (1) |
|
|
298 | (1) |
|
|
298 | (4) |
|
|
302 | (1) |
|
|
303 | (2) |
|
Chapter 9 Securing Cisco Unity Connection |
|
|
305 | (34) |
|
Baseline Security Considerations Overview |
|
|
306 | (5) |
|
Securing User Access to the Unity Connection |
|
|
311 | (5) |
|
Securely Integrating Unity Connection with Unified CM |
|
|
316 | (9) |
|
Integrating with Cisco Unified CM Securely |
|
|
317 | (1) |
|
Applying Certificates Against the SIP Trunk Integration |
|
|
318 | (5) |
|
|
323 | (2) |
|
Preventing Toll Fraud in Unity Connection |
|
|
325 | (11) |
|
|
325 | (1) |
|
|
325 | (5) |
|
Hardening Access to the TUI/GUI |
|
|
330 | (1) |
|
TUI Voicemail Restricting Alternate Contact Numbers |
|
|
330 | (3) |
|
System Transfers from Call Handlers and Nonsystem Numbers |
|
|
333 | (3) |
|
|
336 | (1) |
|
|
337 | (2) |
|
Chapter 10 Securing Cisco Meeting Server |
|
|
339 | (44) |
|
CMS Overview and Deployment Modes |
|
|
340 | (2) |
|
Operating System Hardening |
|
|
342 | (5) |
|
Infrastructure Considerations |
|
|
347 | (4) |
|
|
351 | (5) |
|
|
354 | (2) |
|
|
356 | (4) |
|
|
359 | (1) |
|
|
360 | (7) |
|
Application Programming Interfaces (APIs) |
|
|
367 | (3) |
|
Inbound and Outbound Calling |
|
|
370 | (11) |
|
|
374 | (3) |
|
|
377 | (1) |
|
Management and Visibility |
|
|
377 | (4) |
|
|
381 | (1) |
|
|
382 | (1) |
|
Chapter 11 Securing the Edge |
|
|
383 | (44) |
|
Business Requirements for the Collaboration Edge |
|
|
383 | (1) |
|
|
383 | (1) |
|
Cisco's Collaboration Edge Architecture |
|
|
384 | (4) |
|
|
386 | (2) |
|
|
388 | (15) |
|
|
390 | (1) |
|
CUBE-Based TDoS Protection |
|
|
391 | (1) |
|
Session Control and Protection |
|
|
392 | (3) |
|
Enabling CUBE for TLS Connectivity |
|
|
395 | (7) |
|
|
402 | (1) |
|
|
402 | (1) |
|
Business-to-Business Communication |
|
|
403 | (1) |
|
Security Features Within Expressway |
|
|
403 | (3) |
|
Deploying Mobile and Remote Access |
|
|
406 | (14) |
|
|
407 | (3) |
|
Certificate Requirements for Mobile and Remote Access |
|
|
410 | (2) |
|
|
412 | (1) |
|
Authentication and Authorization for MRA |
|
|
413 | (3) |
|
|
416 | (2) |
|
Token Scopes and Revocation |
|
|
418 | (1) |
|
|
418 | (1) |
|
Interactive Connectivity Establishment (ICE) |
|
|
419 | (1) |
|
Defending Against Attacks at the Edge |
|
|
420 | (2) |
|
|
422 | (2) |
|
Monitoring and Compliance |
|
|
423 | (1) |
|
|
424 | (1) |
|
|
425 | (2) |
|
Chapter 12 Securing Cloud and Hybrid Cloud Services |
|
|
427 | (44) |
|
Business Drivers for Cloud and Hybrid UC Services |
|
|
428 | (2) |
|
Coordinating for Governance and Compliance |
|
|
430 | (3) |
|
Transport Security and Compliance |
|
|
432 | (1) |
|
Considerations for Secure Calling |
|
|
433 | (13) |
|
Who's Who and What Privileges? |
|
|
437 | (1) |
|
User Onboarding and Role-Based Access |
|
|
437 | (1) |
|
|
438 | (2) |
|
|
440 | (1) |
|
|
441 | (2) |
|
|
443 | (1) |
|
|
443 | (3) |
|
Securing Messaging Services |
|
|
446 | (10) |
|
End-to-End Message Encryption |
|
|
447 | (1) |
|
External Communications and Content Management |
|
|
448 | (3) |
|
|
451 | (4) |
|
|
455 | (1) |
|
Meeting Management and Security Controls |
|
|
456 | (7) |
|
Un-Scheduled and Scheduled Meetings |
|
|
457 | (3) |
|
|
460 | (1) |
|
End-to-End Encryption for Meetings |
|
|
461 | (1) |
|
In Meeting Privacy Controls |
|
|
462 | (1) |
|
Protection of Data at Rest |
|
|
463 | (1) |
|
Security Across Emerging Features |
|
|
463 | (4) |
|
|
464 | (1) |
|
|
465 | (1) |
|
|
466 | (1) |
|
|
467 | (1) |
|
|
467 | (3) |
|
|
470 | (1) |
|
|
470 | (1) |
Afterword |
|
471 | (4) |
Index |
|
475 | |