S 2.373 Drawing up a security policy for VoIP

Initiation responsibility: IT Security Officer, Top Management

Implementation responsibility: Head of IT, IT Security Officer

High expectations are placed on the availability of a telephone system. However, its confidentiality is just as important. For this reason, the secure and proper operation of telecommunication equipment is particularly important. This can only be ensured when the operational procedures are integrated into the existing security-related specifications.

The primary security-related requirements regarding VoIP as well as the security level to be achieved result from the organisation-wide security policy. They should be formulated in a security policy specifically for VoIP to add more detail to and implement the overriding and more generally formulated security policy. In this context, it must be examined whether there are any other overriding specifications, for example IT guidelines, password rules, guidelines for the IT systems the VoIP components are operated on, and specifications for internet usage, need to be taken into account in addition to the organisation-wide security policy.

All persons and groups participating in the planning, purchasing, and operation of the VoIP components must be familiar with the VoIP security policy and adhere to it while working. Like all policies, its contents and implementation should be examined regularly within the framework of a general audit.

The security policy should first specify the overall security level to be reached and provide basic information on the operation of VoIP. The following sections describe some aspects to be taken into consideration.

General regulations for the use of VoIP

All VoIP users should be informed of the potential risks and problems, as well as of the benefits associated with the use of VoIP, but also of the limits of the security safeguards implemented.

Since new security gaps in VoIP components are being made public all the time, the IT Security Management should inform themselves regularly about the current risks. It may be appropriate to inform the employees regularly about the most recent threats in order to make them aware of the risks.

When drawing up a security policy, it is recommended to proceed in such a way that the maximum requirements and specifications for the security of the systems are stated initially. These requirements and specifications should then be agreed to by all parties involved and examined in terms of their feasibility. Ideally, all aspects necessary will be taken into account. For every step rejected and specification relaxed in the second step, the reasons for the rejection or relaxation of the specification should be documented.

The following must be clearly stated in the security policy:

Employees must be informed of the conditions under which they are permitted to use VoIP outside of the organisation, since other security regulations may apply here under some circumstances.

VoIP middleware

The following must be specified in terms of the operation of VoIP middleware:

VoIP terminal devices

In the following, specifications for the operation of VoIP terminal devices are presented.

The IT operating personnel is responsible for implementing the VoIP security policy; changes to and deviations from this policy must only be performed upon coordination with the IT Security Officer.

Review questions: