Overview
Explore the STIR/Shaken framework designed to combat robocalling and phone scams in this 44-minute conference talk from RSA Conference. Delve into the intricacies of voice service security with Senior Security Architect Daksha Bhasker as she explains the framework's basic flow, reference architecture, and call flow. Examine attestation levels, voice attacks, and crucial security architecture considerations. Learn about infrastructure, data sensitivity, security zones, and relevant protocols like SIP and RTP. Gain insights into the SHAKEN Certificate Management Architecture, noteworthy certificate specifications, and token security considerations. Understand the role of caches and intermediaries/gateways in the framework. By the end of this talk, become part of the cybersecurity community working to thwart robocalling and support voice professionals in implementing secure architectures.
Syllabus
Intro
FREE
Phone Technologies
STIR SHAKEN Framework Basic Flow
SHAKEN Reference Architecture
SHAKEN Reference Call Flow
Attestation Levels
Voice Attacks
Security Architecture Considerations
Infrastructure
Data Sensitivity
Security Zone
Protocols: SIP, RTP
SHAKEN Certificate Management Architecture (1)
Note Worthy Cert Specs for STIR SHAKEN Framework
Tokens - Security Considerations
Cache Considerations
Intermediaries/Gateways
APPLY
Session Objectives
Taught by
RSA Conference