UC security: When the shoe won't fit, compress the foot

Information security today seems to be suffering from many flawed assumptions

If your security model is location-centric and depends on keeping things separate, how do you respond to a disruptive technology like unified communications?

This is a pattern that keeps repeating in many different areas: the security paradigm looked good until a technology comes along, changes the assumptions and reveals the inadequacy of the model.

So what do most companies do? They delay adoption of the disruptive technology and try to change it in a way that makes the inadequate security paradigm look less inadequate. If the paradigm is broken, pretend it isn't and try to shoehorn the new technology into a broken model.

Take unified messaging, a key component of UC. Different types of messaging, such as voice mail, fax, e-mail, which were once held in separate locations are merged into a single mailbox. The security, however, was location-centric.

It treated messages differently based on where they were stored. So stuff in the PBX (voice mail) required four-digit pin to access and was deleted after one month with no archiving. Stuff in the fax server was kept forever and required directory authentication.

E-mail had yet another set of policies. The implementation of these security measures was dependent upon location: if it's in the PBX, this is how it works. Unified messaging comes along and messes up this model. So what do many companies do?

They create multiple in-boxes with different retention policies for each user, to store the different types of messages. When lacking a security model to deal with unified in-box, don't fix the model - un-unify the in-box!

The correct response is to realize that the security policy is based on a mistaken requirement/assumption of "single set of retention policies per storage location". This assumption should be replaced with "retention policies depend on the content of a message, not its location".

Unified messaging is responsible for revealing the flaw in the assumption, but is not the cause of the flaw. Because it is a new technology and because it is disruptive there is a tendency to assume that what worked before should work now and therefore the new technology is at fault - let's fix it!

Information security today seems to be suffering from many such flawed assumptions.

Many of the old, comfortable paradigms are falling prey to disruptive technologies, leaving security professionals wondering how to respond. Perimeter security, IP-address ACLs, static segmentation, signature-based intrusion-prevention systems and antivirus are all failing models in the face of mobility, UC, virtualization, polymorphic threats and so on.

When a disruptive technology is revealing a flaw in your security assumptions, don't shoot the messenger.

Re-evaluate your assumptions instead of trying to fit the new thing into an antiquated paradigm.

Join the Good Gear Guide newsletter!

Error: Please check your email address.

Tags unified communicationsNetworkingsecurityappliance

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Andreas M. Antonopoulos

Network World
Show Comments

Essentials

Lexar® JumpDrive® S57 USB 3.0 flash drive

Learn more >

Microsoft L5V-00027 Sculpt Ergonomic Keyboard Desktop

Learn more >

Mobile

Lexar® JumpDrive® S45 USB 3.0 flash drive 

Learn more >

Exec

Lexar® Professional 1800x microSDHC™/microSDXC™ UHS-II cards 

Learn more >

Audio-Technica ATH-ANC70 Noise Cancelling Headphones

Learn more >

Lexar® JumpDrive® C20c USB Type-C flash drive 

Learn more >

HD Pan/Tilt Wi-Fi Camera with Night Vision NC450

Learn more >

Budget

Back To Business Guide

Click for more ›

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?