Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Is Your Security Infrastructure Ready for IPv6?

Security experts urge organizations to test IPv6 compatibility across security products and gateways as networks undergo upgrades

If your IT department hasn’t thought about an IPv6 strategy yet, you’re behind the curve. While IPv6 was designed mainly to address the exhaustion of IPv4 addresses, it’s creating several challenges for IT departments in terms of ensuring the end-to-end stability and performance of enterprise IP networks and the Internet as a whole.

Security experts urge organizations to test IPv6 compatibility across security products and gateways as networks undergo upgrades

If your IT department hasn’t thought about an IPv6 strategy yet, you’re behind the curve. While IPv6 was designed mainly to address the exhaustion of IPv4 addresses, it’s creating several challenges for IT departments in terms of ensuring the end-to-end stability and performance of enterprise IP networks and the Internet as a whole.

Q1 Labs, a provider of security intelligence solutions, is urging organizations to look at how Security Information and Event Management (SIEM) systems as well as IPS and IDS are configured as organizations move to IPv6-based networks.

Testing security Solutions for IPv6 compatibility“Not all security software and appliances are set up to deal with fully IPv6 or hybrid environments straight off the bat,” explains Chris Poulin, CSO for Q1 Labs. 

Poulin, who spent eight years in the U.S. Air Force managing global intelligence networks and developing software, believes that many organizations still don’t fully appreciate the IPv6 problem. Internet Protocol Version 6 (IPv6) is designed to succeed Internet Protocol version 4 (IPv4) and was ratified by the Engineering Task Force (IETF) in 1998. The outgoing IPv4 has a theoretical hard limit of 4.3-billion addresses, which is quickly filling up, especially with the growth in smart phones and tablets expected to hit a billion units by the end of the year.

Even though the new protocol has a 128-bit address range (340-undecillion limit) and additional features, adoption of IPv6 is still sluggish. “The move is a significant project for any IT department and security needs to be on the check-list of things to test before making the move,” Poulin urges. “SIEM is actually a good place to test if IPv6 security procedures are feasible and working correctly.”

IPv6 security risks include bugs in code, protocol weaknesses and poor implementations by security and network vendors due to minimal familiarity with the new standard. “Attacks using an IPv6 tunnel on a hybrid network are examples of new threats that might be missed unless organizations start to prepare now for the inevitable change,” Poulin said. “The current pace of change is relatively slow, but it is likely to speed up as large service providers and trading platforms move to IPv6 over the next few years, which could mean that IT departments are suddenly dumped with a project to move with minimal notice — it would be wise to start checking now before the call comes,” Poulin added.

Some believe that IPv6 strategies should even be a board-level concern. “Many believe that the move to IPv6 should be a board-level risk management concern, equivalent to the Y2K problem or Sarbanes-Oxley compliance,” Ram Mohan, EVP and CTO at domain registrar, Afilias wrote in a SecurityWeek column. “During the late 1990s, technology companies worldwide scoured their source code for places where critical algorithms assumed a two-digit date,” Mohan added. “This seemingly trivial software development issue was of global concern, so many companies made Y2K compliance a strategic initiative. The transition to IPv6 is of similar importance. As more companies start to wake up to IPv6, this kind of compliance project will become more widespread.”

“CIOs who have not planned IPv6 transition plans as part of their strategic agenda must act now, or risk the entire enterprise online,” Mohan concluded.

Advertisement. Scroll to continue reading.

“Even if you aren’t implementing an IPv6 network, you still need to be concerned about the transition,” according to Marc Solomon, SVP of Marketing at Sourcefire. “As IPv6-enabled consumer devices such as smartphones and tablets enter your network, intended or not, you now have two potential communication channels you need to worry about,” he added. “Identifying controls, solutions and policies that support IPv6 alongside IPv4 is essential to maintaining your organization’s security standards.”

Related Reading: Is IPv6 Part of Your Risk Management Framework?

Related Reading: No IPocalypse, but the IPv6 Transition Still Presents Risks

Related: Why Everyone Needs to Care About IPv6

Related Reading: World Takes IPv6 for a Test Drive: Is your Organization Prepared for the Risks?

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed the new CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...