GSC16-GTSC9-10

advertisement
Document No:
GSC16-GTSC9-10
Source:
ATIS
Contact:
Wayne Zeuch, wzeuch@atis.org
GSC Session:
GTSC-9
Agenda Item:
4.2
ATIS Cybersecurity
Standards
Wayne Zeuch,
ATIS
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
GSC16-GRSC9-10
Highlight of Current Activities (1)
ATIS’ Packet Technologies and Systems Committee (PTSC) Completed
• ATIS-1000034.2010, NGN Security Mechanisms and Procedures
– Describes the security mechanisms and specifies the suite of options
that can be used to fulfill the requirements described in ATIS1000029.2008 (NGN Security Requirements).
– Describes identification, authentication and authorization mechanisms;
discusses transport security for signalling, OAM&P and media security;
and describes audit-trail-related mechanisms and provisioning.
• ATIS-1000044.2011, ATIS Identity Management (IdM):
Requirements and Use Cases Standard
– Provides IdM example use cases and requirements for the NGN and its
interfaces. IdM functions and capabilities are used to increase
confidence in identity information and support and enhance business
and security applications including identity-based services.
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
2
GSC16-GRSC9-10
Highlight of Current Activities (1)
•
•
•
•
ATIS’ Packet Technologies and Systems Committee
(PTSC) – Is Currently
Developing a Standard that provides a framework for the
design, implementation, and operations of a security
architecture by NGN providers, and guidelines for a structured
approach and methodology for NGN security planning and
operations.
Defining security guidelines to support IP Network Interface
(INI) to an IP emergency network.
Defining the security guidelines for external Data Border
Function (DBF) interfaces (UNI, ANI, NNI, SNI).
Addressing the necessary requirements and mechanisms in
support of Emergency Telecommunications Services
(ETS) authentication.
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
3
GSC16-GRSC9-10
Highlight of Current Activities (2)
• PTSC continues to focus on security-related topics that will
ensure robust signalling and communications standards and
network implementations that will provide adequate protection
and support for multimedia and emergency services in the
current cybersecurity environment:
–
–
–
–
–
–
ETS Authentication
Data Border Function Requirements
Security Mechanisms
Location
Identity Management
Certificate Management
• Security architecture is layered, both horizontally and
vertically, with border element functions protecting trusted
from untrusted domains.
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
4
GSC16-GRSC9-10
Highlight of Current Activities (3)
• PTSC’s focus is on specifying security
considerations for Layers 1 through 5 for UNIs,
NNIs, ANIs, and SNIs
– Generation of interface requirements will:
• Attempt to reduce number of available
interconnection options, without compromising the
desired flexibility in implementing the services,
thereby facilitating interoperability
• Facilitate interconnection negotiations
• Ensure adequate security will be provided
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
5
GSC16-GRSC9-10
Highlight of Current Activities (4)
ATIS’ Telecom Management and Operations
Committee (TMOC)
• TMOC will continue to address
– Management aspects of security, especially
concerning NGN Carrier Interconnection
arrangements and VoIP Registry Database
– Management aspects of security, as driven by
the ATIS Board (e.g., TOPS Council or CIO
Council)
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
6
Strategic Direction
GSC16-GRSC9-10
• ATIS continues to develop a suite of security
authentication and IdM standards that will
facilitate secure interconnection of:
– transport facilities
– signalling facilities
– services and applications
• Cloud computing may pose significant security
issues that will need to be addressed, and ATIS
committees will continue to collaborate (e.g.,
PTSC, CSF, etc.) on such matters.
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
7
Challenges
GSC16-GRSC9-10
• SIP security solutions are tailored to be
end to end
• SIP/SIPPING/SIMPLE/etc. RFCs have
well written security sections that are not
fully implemented in vendor products
• Security solutions have an impact on delay
and performance
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
8
Next Steps/Actions
GSC16-GRSC9-10
• ATIS will continue on its current path of
generating a complete suite of standards
that can be used to facilitate
interconnection negotiations and result in
interconnection scenarios that are secure
• ATIS will continue to collaborate with and
provide input into the ITU-T on global
solutions for security- and IdM-related
matters.
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
9
Proposed Resolution
GSC16-GRSC9-10
• ATIS supports the reaffirmation of the
existing Cybersecurity Resolution
contained in:
– Resolution GSC-15/11 – Cybersecurity
• Request that the Resolutions Editor make
editorial formatting updates; e.g.:
• Align bullet formatting
• Removal of blank items
– Recognizing #17
– Resolves #7
GSC15-CL-16
2 September 2010
RESOLUTION GSC-15/11: (GTSC) Cybersecurity (Revised)
The 15th Global Standards Collaboration meeting (Beijing, 30 August – 2 September 2010)
Recognizing:
1. the crucial importance of the information and communications infrastructure to
practically all forms of social and economic activity, and the need for everyone to assume
their role in contributing to its security on an ongoing basis;
2. that the legacy Public Switched Telephone Network (PSTN) has a level of inherent
security properties because of its hierarchical structure and built-in management systems;
3. that the converged legacy networks and IP networks are therefore potentially more
vulnerable to intrusion if adequate care is not taken to integrate security requirements into
the planning and design as early as possible;
4. that the type and number of cyber attacks in terms of worms, viruses, malicious intrusions
and thrill-seeker intrusions is on the increase;
5. that new cyber attacks such as phishing, pharming, malware distributed via the web, and
botnets are emerging and spreading rapidly;
6. that the source of attack or spoofed IP address used by attackers need to be identifiable;
7. that ITU-T Recommendation X.1205 “Overview of Cybersecurity” provides a definition,
description of technologies, and network protection principles;
8. that ITU-T Recommendation X.805 provides a systematic framework for identifying
security vulnerabilities that together with many new security-related deliverables from
the ITU and the Participating Standards Organizations (PSOs) can assist risk assessment
and the development of mechanisms to mitigate the risks;
9. that the ITU-T and ISO/IEC JTC 1 already has a significant body of published materials
and ongoing work that is directly relevant to this topic, that needs to be taken into
account and integrated;
10. that the UN World Summit on the Information Society identified the ITU as the
facilitator and moderator for its Action Line C5 (Building confidence and security in the
use of ICTs);
11. that the Global Cybersecurity Agenda (GCA) of the ITU promotes international
cooperation aimed at proposing strategies for solutions to enhance confidence and
security in the use of ICTs;
12. that the World Telecommunication Standardization Assembly (Johannesburg, 2008)
revised WTSA Resolution 50 on Cybersecurity, which underlined the vigorous activity
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
10
GSC16-GRSC9-10
Supplemental Slides
Halifax, 31 Oct – 3 Nov 2011
ICT Accessibility For All
11
Supplemental Slides
GSC16-GRSC9-10
• PTSC Issues may be found at: http://www.atis.org/0191/issues.asp
• PTSC Active Issues which have a security component are:
–
–
–
–
–
–
–
Issue #
S0060
S0061
S0063
S0073
S0074
S0093
S0094
Halifax, 31 Oct – 3 Nov 2011
Title
ATIS NGN Identity Management Mechanisms
Certificate Management
ATIS ETS Authentication
Security Guidelines for DBF Interface
Security Guidelines for Carrier Interconnection (NNI)
NGN Security Planning & Operations Guidelines
Security Guidelines for IP Network Interface (INI) to an
Emergency Services Network
ICT Accessibility For All
12
Supplemental Slides
GSC16-GRSC9-10
• PRQC Issues may be found at: http://www.atis.org/0010/issues.asp
• PRQC Active Issues which have a security component are:
–
–
–
–
Issue #
A0010
A0014
A0035
A0045
Halifax, 31 Oct – 3 Nov 2011
Title
User Plane Security Requirements in NGNs
Network-Network Interface (NNI) User Plane Security
Impact of Security on QOS Performance in NGNs
Service-specific Security Mechanism Implementation Options
ICT Accessibility For All
13
Download