S 5.152 Exchange of information and resources using peer-to-peer services.

Initiation responsibility: Head of IT, IT Security Officer

Implementation responsibility: Administrator

Peer-to-peer (often abbreviated to P2P) refers to the exchange of information between IT systems with equal rights (peers). With peer-to-peer every IT system can offer or use services. The communication connection established for this purpose can be used by several IT systems to share resources with each other in a decentralised manner. The typical functions of a server and a client are thus united on one IT system.

Peer-to-peer applications are often used to provide the following services to other peers:

Advantages of peer-to-peer services

In contrast to a server-based architecture, peer-to-peer services offer numerous advantages:

However, the use of peer-to-peer services has also a large number of disadvantages which in may cases are due to the lack of centralisation (see also T 2.147 Lack of centralisation with peer-to-peer). For example, it is not possible to centrally check the exchanged information for malware.

Architecture

Depending on the requirements, peer-to-peer services can be used in a local network only or in the entire internet. The number of IT systems which can share these resources with each other ranges from only a few selected peers to an unmanageable number of unknown peers. Generally, two types of peer-to-peer services can be differentiated:

Local peer-to-peer services in a LAN
Figure: Local peer-to-peer services in a LAN

Public peer-to-peer via internet (file sharing)
Figure: Public peer-to-peer via internet (file sharing)

Alternatives for the use of peer-to-peer services

There are only a few services where peer-to-peer communication between IT systems is absolutely necessary. For example, resources can also be provided centrally by servers. Only the use of servers allows for central implementation of specifications, for example, that only authorised persons may access the information. The following services which can usually be distributed over peer-to-peer networks can be provided centrally:

Recommendations for the use of local peer-to-peer services

If possible, dedicated servers should be used for exchange of information instead of shares via peer-to-peer services. In exceptional cases, however, the use of peer-to-peer solutions may be necessary, for example, for VoIP. Therefore, it must be defined:

If required, the users must be trained in the use of peer-to-peer services. It must be ensured that the peer-to-peer services are restricted to the LAN only.

Recommendations for the use of public peer-to-peer services

In general, uncontrolled flow of information from a LAN must be prevented. This also includes direct peer-to-peer connections from peers to IT systems which are not located in the LAN. Due to lack of centralisation, information can leave (e.g. confidential information) or enter (e.g. malware) the LAN unchecked. The following safeguards can be implemented to prevent the use of public peer-to-peer services:

If peer-to-peer services are to be used in the organisation this must be decided by the management of the organisation. The IT security officer must be involved in this decision and the decision including the residual risks must be documented.

Review questions: