Andrea Danti - Fotolia
The endless growth of voice over IP in business networks has resulted in growing deployment and importance of enterprise session border controllers. As SBCs and Session Initiation Protocol-based communications become more prominent, SBC security becomes increasingly important.
Some SBCs are implemented as functions in a virtual machine or container, either on premises or in a public cloud, rather than as stand-alone appliances. This deployment model offers additional challenges, as deployments might have to handle more security functions and may be at risk of greater exposure to SBC security attacks on their platforms.
Security has always been a feature category for SBCs. But, as with most products, different vendors place differing amounts of importance on specific features. If there is an essential SBC security feature, however, it's denial-of-service (DoS) protection.
Given that the SBC is at the edge of the network, typically bordering a public network, it is exposed to DoS attacks. Those attacks could be the garden-variety IP attacks, such as ping of death or TCP SYN flooding that attempts to deny service by flooding the IP stack, or more sophisticated attacks specifically aimed at SBCs.
An attack aimed specifically at SBCs might consist of Session Initiation Protocol signaling and registration overloads. So, expect DoS attack SBC security protection to evolve and become more sophisticated to keep up with -- and hopefully ahead of -- the attackers.
Keeping unauthorized users out of the SBC system is an important consideration. Configuration security can be enhanced when SBCs provide access control lists and URL filtering that limit device access to specified users and IP addresses.
Let's not forget the voice-over-IP service itself is a valuable resource. Some companies extend their SBC security umbrella to include validation of media and signaling to prevent theft of service.
Finally, SBCs running in virtualized containers may have additional security challenges, as an attack on the container -- be it VMware, Kubernetes or others -- can affect the SBC app. The same type of DoS attacks and administrative intrusions are security issues that affect the SBC, but over which the SBC has little control.
Do you have a question for Kevin Tolly or any other experts? Ask your enterprise-specific questions today! (All questions are treated anonymously.)
Dig Deeper on Unified Communications Security
Related Q&A from Kevin Tolly
Porting business phone numbers to your UCaaS provider may be more complicated than you realize. Learn three ways you can prepare your organization ... Continue Reading
The rise of private cloud is changing how some vendors approach UC services. Find out the benefits of UCaaS and which vendors offer UCaaS in a ... Continue Reading
SIP trunking vendors are using security features to differentiate themselves in a crowded market. Our expert explains what types of SIP trunking ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.