DOCUMENT #: GSC13-PLEN-57 FOR: Information SOURCE: Charles Brookson AGENDA ITEM: 6.3 CONTACT(S): charles@zeata.co.uk Update on ETSI Security work Charles Brookson OCG Security Chairman Submission Date: June 27, 2008 OCG Security (1) • Operational Co-ordination Sub-Group on Security • Horizontal co-ordination structure for security issues – Ensuring security is properly considered in each ETSI Technical Body (TB) – Detecting any conflicting or duplicate work • Participation: – TBs are free to nominate Members to participate in the work of the group • Working methods: – Via email – When necessary co-sited “joint security” technical working meetings – Issues sent to SECsupport@etsi.org – Mailing list: OCG_SECURITY@LIST.ETSI.ORG 2 OCG Security (2) Security Workshop • ETSI holds an annual security workshop. The 3rd Workshop held in January this year was well attended, and details can be found on many security issues at http://portal.etsi.org/securityworkshop/ • The next workshop is scheduled for 13th and 14th January 2009 in Sophia Antipolis, and contributions are welcome. White Papers • The latest edition of our Security White and Product Proofing papers giving information and all security activities can be found at: http://www.etsi.org/WebSite/technologies/WhitePapers.aspx • The Security White paper is in the process of being updated and a new edition will be published later this year. 3 ETSI Committees per Security Areas Emergency Telecommunications Mobile/Wireless Algorithms SES Security Algorithms Group of Experts (SAGE) MESA* 2G/3G Mobile 3GPP* EMTEL DECT TETRA AT Electronic Signatures (ESI) SmartCard Platform (SCP) Smart Cards Information Technology Infrastructure Next Generation Networks (TISPAN) Fixed and Convergent Networks * ETSI is a founding partner for this partnership project ** Closed Committee 4 TETRA • TErrestrial Trunked Radio • Mobile radio communications – Used for public safety services • Security features include: – Mutual Authentication – Encryption – Anonymity 5 Mobile Security • IMEI (International Mobile Equipment Identity) – Protection against theft – Physical marking of the terminal – Blacklisted by operator if stolen • FIGS (Fraud Information Gathering System) – Monitors activities of roaming subscribers – Home network informed – Fraudulent calls identified terminated • Priority – Public safety service – Allows for high priority access • Location 6 Algorithms • ETSI is a world leader in creating cryptographic algorithms and protocols to prevent fraud and unauthorised access to ICT and broadcast networks, and to protect customers’ privacy • ETSI SAGE (Security Algorithm Group of Experts) – Centre of competence for algorithms in ETSI • Algorithms for: – – – – – DECT GSM, GPRS, EDGE TETRA UMTS … 7 Smart Card Standardization • ETSI Smart Card Standardization – ETSI Technical Committee Smart Card Platform (TC SCP) – GSM SIM Cards: among most widely deployed smart cards ever – Work extended with UMTS USIM Card and UICC Platform • Current challenges – – – – Expand the smart card platform Implement Extensible Authentication Protocol (EAP) in Smart Cards Allow users access to global roaming UICC platform in secure financial transactions over mobile communications systems 8 Lawful Interception • Delivery of intercepted communications to Law Enforcement Authorities – To support criminal investigation – To counter terrorism • Applies to any data in transit • ETSI Technical Committee LI – defines the Handover interface – from the Operator to the Law Enforcement Authorities 9 Data Retention • Data generated/processed in electronic communications services need to be retained – Required by EC since 2006 (Directive 2006/24/EC) • Retention of Data is similar to LI – Concerns stored traffic, rather than traffic in transit (LI) • ETSI TC LI currently working on three deliverables – Requirements – Specification for Handover interface – Security framework in Lawful Interception and Retained Data environment 10 Electronic Signatures • ETSI and CEN co-operation on the European Electronic Signature • Goal: provide Europe with a reliable electronic signatures framework – Enabling electronic commerce – Supporting eSignature EC Directive • Current challenges – eInvoicing – Registered EMail (REM) • International collaboration – Certificate Policy mapped and aligned with US policy – XML Signature Standard adopted in Japan 11 Future Challenges • ETSI addressing a number of areas • Issues on security are still open – Security Metrics – RFID Security and Privacy – … • ETSI is ready to address these challenges – Supporting its Members – Following its Members’ requirements – Collaborating with other SDO’s 12