How to think about security when migrating to IPv6
One area which may create problems for enterprises wishing to deploy IPv6 is security. Some vulnerabilities may be the same as IPv4 while others will different. Some vulnerabilities may be introduced by additional complexity: transition mechanisms, dual-stacking, etc. Additionally, the process of migration itself introduces change and potential risk.
When large enterprises think about security, a number of areas are involved. These include:
- Audits/Compliance,
- Threat detection,
- Risk analysis,
- Root cause determination,
- Encryption,
- Privacy,
- Confidentiality, and
- Penetration testing
Will migration IPv6 impact these areas? If so, how?
A number of devices or products are used under the general heading of "security". These include:
- Firewalls,
- Intrusion Detection / Intrusion Prevention devices
- Fraud detection
- Proxy?
- VPN?
Will these be impacted?
If you help us by taking this survey, then we can help by writing best practices or strategies for the issues that many organizations face.