ITU-T Workshop on "New challenges for Telecommunication Security Standardizations"

advertisement
ITU-T Workshop on "New challenges for
Telecommunication Security Standardizations"
(Geneva, 09-10 February 2009)
Session 5:
SDO’s security standardization, implementation and
evaluation strategy
Arkadiy Kremer
Chairman ITU-T Study
Group 17
“We have received a strong message from our members that ITU is,
and will remain the world’s pre-eminent global telecommunication
and ICT standards body. And we hear also, and very clearly, that ITU
should continue on its mission to connect the world, and that
bringing the standardization gap, by increasing developing country
participation in our work, is an essential prerequisite to achieve this
goal”.
Malcolm Johnson, TSB Director
(Closing speech at the WTSA-08)
ITU-T Security Workshop (Geneva, 9-10 February 2009)
2 of 21
How does the ITU-T work
 In ITU-T, industry and governments work together to develop
consensus-based “Recommendations”
 Work typically driven by private Sector Members
 Open (for members), transparent, bottom-up process
 Sensitive to national sovereignty: will only cover matters not
considered to be national
 Will not impose contractual terms or operating rules on
private companies
 Recommendations are not binding, but tend to be followed
because they represent true consensus
ITU-T Security Workshop (Geneva, 9-10 February 2009)
3 of 21
ITU-T security activities
 Most of the ITU-T study groups have responsibilities for
standardizing security aspects specific to their technologies (TMN
security, IPCablecom security, NGN security, Multimedia security,
etc.)
 ITU-T SG 17 is the Lead Study Group for:
• Telecommunications security
• Identity management
• Languages and description techniques
ITU-T Security Workshop (Geneva, 9-10 February 2009)
4 of 21
ITU-T SG 17 history
Study Period
Name
17/9/2001-2004
Data networks and telecommunication
software
2005-2008
Security, languages and
telecommunication software
2009-2012
Security
ITU-T Security Workshop (Geneva, 9-10 February 2009)
5 of 21
SG 17 Questions
Questions have been re-organized but all SG 17
security work from 2005-2008 Study Period will
continue
ITU-T Security Workshop (Geneva, 9-10 February 2009)
6 of 21
Proposed SG 17 structure
Working Party 1: Network and information security
• Q 1 Telecommunications systems security project
• Q 2 Security architecture and framework
• Q 3 Telecommunications information security management
• Q 4 Cybersecurity
• Q 5 Countering spam by technical means
ITU-T Security Workshop (Geneva, 9-10 February 2009)
7 of 21
Proposed SG 17 structure (cont.)
Working Party 2: Application security
• Q 6 Security aspects of ubiquitous telecommunication services
• Q 7 Secure application services
• Q 8 Telebiometrics
• Q 9 Service oriented architecture security
ITU-T Security Workshop (Geneva, 9-10 February 2009)
8 of 21
Proposed SG 17 structure (cont.)
Working party 3: Identity management and languages
• Q 10 Identity management architecture and mechanisms
• Q 11 Directory services, Directory systems, and public-key/attribute
certificates
• Q 12 Abstract Syntax Notation One (ASN.1), Object Identifiers (OIDs)
and associated registration
• Q 13 Formal languages and telecommunication software
• Q 14 Testing languages, methodologies and framework
• Q 15 Open Systems Interconnection (OSI)
ITU-T Security Workshop (Geneva, 9-10 February 2009)
9 of 21
Organization of ITU-T X-series Recommendations
(DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY)
Public data networks
X.1-X.199
`
Open Systems Interconnection
X.200-X.299
Interworking between networks
X.300-X.399
Message Handling Systems
X.400-X.499
Directory
X.500-X.599
OSI networking and system aspects
X.600-X.699
OSI management
X.700-X.799
Security
X.800-X.849
OSI applications
X.850-X.899
Open distributed processing
X.900-X.999
Telecommunication Security
X.1000-1999
Information and network security
X.1000-X.1099
Secure applications and services
X.1100-X.1199
Cyberspace security
X.1200-X.1299
Secure applications and services
X.1300-X.1399
ITU-T Security Workshop (Geneva, 9-10 February 2009)
10 of 21
Core Security Recommendations




Strong ramp-up on developing core security Recommendations in SG 17
• 14 approved in 2007
• 27 approved in 2008
• 44 under development for approval this study period
Subjects include:
 Architecture and Frameworks  Web services  Directory
 Identity management  Risk management  Cybersecurity
 Incident management  Mobile security  Countering spam
 Security management  Secure applications  Telebiometrics
 Ubiquitous Telecommunication services  SOA security
Ramping up on:
 Multicast
 Traceback
 Ubiquitous sensor networks
Collaboration with others on many items
ITU-T Security Workshop (Geneva, 9-10 February 2009)
11 of 21
Coordination
 ISO/IEC/ITU-T Strategic Advisory Group Security
Oversees standardization activities in ISO, IEC and ITU-T relevant to
security; provides advice and guidance relative to coordination of
security work; and, in particular, identifies areas where new
standardization initiatives may be warranted (portal established,
workshops conducted)
 Global Standards Collaboration
ITU and participating standards organizations exchange information on
the progress of standards development in the different regions and
collaborate in planning future standards development to gain synergy
and to reduce duplication. GSC-13 resolutions concerning security
include Cybersecurity (13/11), Identity Management (13/04), Network
aspects of identification systems (13/03), Personally Identifiable
Information protection (13/25).
ITU-T Security Workshop (Geneva, 9-10 February 2009)
12 of 21
SG 17 Security Project
 Security Coordination
• Within SG 17, with ITU-T SGs, with ITU-D and externally
• Kept others informed - TSAG, IGF, ISO/IEC/ITU-T SAG-S…
• Made presentations to workshops/seminars and to GSC
• Maintained reference information on LSG security webpage
 Security Compendium
• Includes catalogs of approved security-related
Recommendations and security definitions extracted from
approved Recommendations
 Security Standards Roadmap
• Includes searchable database of approved ICT security
standards from ITU-T and others (e.g., ISO/IEC, IETF, ETSI, IEEE,
ATIS)
 ITU-T Security Manual – assisted in its development
ITU-T Security Workshop (Geneva, 9-10 February 2009)
13 of 21
Challenges
 Addressing security to enhance trust and confidence of users in
networks, applications and services
 Balance between centralized and distributed efforts on
developing security standards
 Legal and regulatory aspects of cybersecurity, spam,
identity/privacy
 Address full cycle – vulnerabilities, threats and risk analysis;
prevention; detection; response and mitigation; forensics;
learning
 Uniform definitions of security terms and definitions
 Effective cooperation and collaboration across the many bodies
doing cybersecurity work – within the ITU and with external
organizations
 Keeping ICT security database up-to-date
ITU-T Security Workshop (Geneva, 9-10 February 2009)
14 of 21
Summary
1. There are number of different languages in which are used for
security items: technical, business, legal, evaluation, law
enforcement institution, standardization. And we have only few
bodies which can organize the harmonization of these different
languages. The ITU-T might be the leader in creating such common
vocabulary for better understanding and creation of cybersecurity.
Such a vocabulary will have to align fully with the terminology used
in the existing SDO vocabularies and embrace telecom-sectorspecific security activities as well as terminology that has
established itself in the professional community. It will also have to
address evolving terminology associated with new risks, threats
and challenges.
ITU-T Security Workshop (Geneva, 9-10 February 2009)
15 of 21
Summary
2. It is necessary to assure the continued relevance of security
standards by keeping them current with rapidly-developing
telecommunications technologies and operators’ trends (in ecommerce, e-payments, e-banking, telemedicine, fraudmonitoring, fraud-management, fraud identification, digital identity
infrastructure creation, billing systems, IPTV, Video-on-demand,
grid network computing, ubiquitous networks, etc.).
3. Considerable attention has been recently given to the issue of
trust between network providers and communication
infrastructure vendors, in particular, in terms of communication
hardware and software security. Issues of how trust can be
established and/or enhanced need to be considered.
ITU-T Security Workshop (Geneva, 9-10 February 2009)
16 of 21
Summary
4. The elaboration of recommendations for the security
methodologies and procedures necessary for compliance in the
network infrastructure could become the foundation for vendors’
understanding of network providers’ challenges as well as the basis
for harmonization of national requirements to communication
hardware and software certification. Such recommendations could
address:
- user identification and access management issues, protection of
service data for network management and access,
- use of universal open interfaces for cryptographic protection tools
interconnect in compliance with national standards,
- inter-working in TCP/IP infrastructure, with the tools for harmful
software and denial of service attacks counteraction.
ITU-T Security Workshop (Geneva, 9-10 February 2009)
17 of 21
Summary
5. There are a number of standards in the field of
telecommunications and information security. But a standard is the
real standard when it is used in real-world applications. Business
and governmental bodies need to learn more about standards from
their business applications rather than from a technical point of
view. The ITU-T might provide leadership in preparing reports on
information security standardization processes from the point of
view of business applications e.g to support procurement
strategies.
The development of a procurement hand-book which analyzes
main types of business models and main standards which support
these models could be a great help to the telecom industry.
ITU-T Security Workshop (Geneva, 9-10 February 2009)
18 of 21
Summary
6. Implementations of ITU-T security Recommendations capable of
being
tested
for
conformance
and
interoperability.
Implementations that cannot be tested, that involve extensive
resources, or that require access to confidential information, are
unacceptable. There needs to be some work to determine how the
need for conformance and interoperability testing of
implementations can be supported.
ITU-T Security Workshop (Geneva, 9-10 February 2009)
19 of 21
Some useful web resources
• ITU Global Cybersecurity Agenda (GCA)
http://www.itu.int/osg/csd/cybersecurity/gca/
• ITU-T Home page http://www.itu.int/ITU-T/
• Study Group 17 http://www.itu.int/ITU-T/studygroups/com17/index.asp
e-mail:
tsbsg17@itu.int
• LSG on Security http://www.itu.int/ITU-T/studygroups/com17/tel-security.html
• Security Roadmap http://www.itu.int/ITU-T/studygroups/com17/ict/index.html
• Security Manual http://www.itu.int/publ/T-HDB-SEC.03-2006/en
• Cybersecurity Portal http://www.itu.int/cybersecurity/
• Cybersecurity Gateway http://www.itu.int/cybersecurity/gateway/index.html
• ITU-T Recommendations http://www.itu.int/ITU-T/publications/recs.html
• ITU-T Lighthouse http://www.itu.int/ITU-T/lighthouse/index.phtml
• ITU-T Workshops http://www.itu.int/ITU-T/worksem/index.html
ITU-T Security Workshop (Geneva, 9-10 February 2009)
20 of 21
Thank you!
Arkadiy Kremer
kremer@rans.ru
ITU-T Security Workshop (Geneva, 9-10 February 2009)
21 of 21
Download