ITU Workshop on “ICT Security Standardization for Developing Countries” (Geneva, Switzerland, 15-16 September 2014) ITU-T Study Group 17 Security Arkadiy Kremer ITU-T SG17 chairman kremer@rans.ru Geneva, Switzerland, 15-16 September 2014 Strategic Goal of ITU-T* To develop interoperable, nondiscriminatory international standards (ITU-T Recommendations) To assist in bridging the standardization gap between developed and developing countries To extend and facilitate international cooperation among international and regional standardization bodies *ITU Plenary Plenipotentiary Conference Resolution 71 Geneva, Switzerland, 15-16 September 2014 2 ITU-T Study Group 17, Security Primary focus is to build confidence and security in the use of Information and Communication Technologies (ICTs) cybersecurity, CYBEX, cloud computing security, identity management, protection of PII, PKI and PMI, Information security management, countering spam, security architecture, security of applications, telebiometrics, Geneva, Switzerland, 15-16 September 2014 security of services for: - the Internet of things, - smart grid, - mobile, smartphone, - IPTV, home network - web services, - social network, - mobile financial system, - transportation systems, also directory, OIDs, technical languages 3 ITU-T Study Group 17, Security Lead Study Group in ITU-T for: Security Identity management Languages and description techniques With responsibilities for the study of the appropriate core Questions and to define and maintain the overall framework and to coordinate, assign and prioritize the studies with others Parent Study Group for two JCAs: Identity management Child online protection Joint Coordination Activities aim mainly at improving and planning. Geneva, Switzerland, 15-16 Septembercoordination 2014 4 ITU-T Study Group 17, Security Meets twice a year; last meeting had 145 participants Responsible for 325 Recommendations, 20 Supplements and 3 Implementer’s Guides 76 new or revised Recommendations and other texts are under development for approval in September 2014 or later Manual on Security in Telecommunications and Information Technology provides a broad introduction to the security work of ITU-T. http://www.itu.int/pub/T-HDB-SEC.05-2011 Work organized into 5 Working Parties with 12 Questions Geneva, Switzerland, 15-16 September 2014 5 SG17, Security WP 1/17 WP 2/17 WP 3/17 WP 4/17 WP 5/17 Fundamental security Network and information security IdM + Cloud computing security Application security Formal languages Q1/17 Q4/17 Q8/17 Q6/17 Q11/17 Telecom./ICT security coordination Cybersecurity Cloud Computing Security Ubiquitous services Directory, PKI, PMI, ASN.1, OID, ODP, OSI Q2/17 Q5/17 Q10/17 Q7/17 Q12/17 Security architecture & framework Countering spam IdM Secure applications services Languages & Testing Q3/17 Information security management Q9/17 Telebiometrics Examples of SG17 Standards Security Rec. ITU-T X.509 – Public key and attribute certificate frameworks Rec. ITU-T X.805 – Security architecture for systems providing end-to-end communications Rec. ITU-T X.1037 – IPv6 technical security guidelines Rec. ITU-T X.1205 – Overview of Cybersecurity Rec. ITU-T X.1303bis – Common alerting protocol Rec. ITU-T X.1500-series – Cybersecurity Information exchange (CYBEX) Geneva, Switzerland, 15-16 September 2014 7 Examples of SG17 Standards Identity Management (IdM) Rec. ITU-T X.1252 – Baseline identity management terms and definitions Rec. ITU-T X.1255 – Framework for discovery of identity management information Languages and description techniques Rec. ITU-T X.660 - General procedures and top arcs of the international object identifier tree Rec. ITU-T X.680 – Abstract Syntax Notation One Geneva, Switzerland, 15-16 September 2014 8 Standardization Challenges The primary challenges are the time it takes to develop a standard (compared to the speed of technological change and the emergence of new threats) and the shortage of skilled and available resources. We must work quickly to respond to the rapidly-evolving technical and threat environment but we must also ensure that the standards we produce are given sufficient consideration and review to ensure that they are complete and effective. Geneva, Switzerland, 15-16 September 2014 9 Coordination with other bodies ITU-T Study Group 17 Security ITU-D, ITU-R, 10/93 Examples of Collaboration With ISO/IEC JTC 1/SC 27: EAAF: ITU-T X.1254 | ISO/IEC 29115 ISMS-T: ITU-T X.1051 | ISO/IEC 27011 With OASIS: CAP: ITU-T X.1303bis | OASIS CAP v1.2 XACML: ITU-T X.1144 | OASIS XACML 3.0 With IETF: IODEF: ITU-T X.1541 | IETF RFC 5070 RID: ITU-T X.1580 | IETF RFC 6545 Geneva, Switzerland, 15-16 September 2014 11 Examples of Collaboration With ISO/IEC JTC 1/SC 6: PKI: ITU-T X.509 | ISO/IEC 9594-8 USN: ITU-T X.1311 | ISO/IEC 29180 OID: ITU-T X.660 | ISO/IEC 9834-1 ASN.1: ITU-T X.680 | ISO/IEC 8824-1 With ETSI TC MTS: TTCN-3: ITU-T Z.161 | ETSI ES 201873-1 With ISO/IEC JTC 1/SC 37: BIO-API: ITU-T X.1083 | ISO/IEC 24708 Geneva, Switzerland, 15-16 September 2014 12 Collaboration Study Group 17 has a strong record of collaboration with other bodies. We are interested in extending our cooperation and collaboration with other standards bodies in security areas of common interest We welcome identification of specific topics for collaboration Geneva, Switzerland, 15-16 September 2014 13 Developing Countries We must recognize and respect the differences in developing countries respective environments: their telecom infrastructures may be at different levels of development from those of the developed countries; their ability to participate in, and contribute directly to the security standards work may be limited by economic and other considerations; and their needs and priorities may be quite different Geneva, Switzerland, 15-16 September 2014 14 Study Group 17 Geneva, Switzerland, 15-16 September 2014 * Average over last 7 meetings 15 Study Group 17 Leadership 25 20 15 Developing Countries Developed Countries 10 5 0 2009-2012 Geneva, Switzerland, 15-16 September 2014 2013-2016 16 Summary Study Group 17, with its strong engagement of developing countries, is pleased to collaborate on ICT security standardization with other bodies in areas of common interest for mutual benefit Geneva, Switzerland, 15-16 September 2014 17 Reference links Webpage for ITU-T Study Group 17 • http://itu.int/ITU-T/studygroups/com17 Webpage on ICT security standard roadmap • http://itu.int/ITU-T/studygroups/com17/ict Webpage for JCA on identity management • http://www.itu.int/en/ITU-T/jca/idm Webpage for JCA on child online protection • http://www.itu.int/en/ITU-T/jca/COP Webpage on lead study group on security • http://itu.int/en/ITU-T/studygroups/com17/Pages/telesecurity.aspx Webpage on lead study group on identity management • http://itu.int/en/ITU-T/studygroups/com17/Pages/idm.aspx Webpage on lead study group on languages and description techniques • http://itu.int/en/ITU-T/studygroups/com17/Pages/ldt.aspx ITU Security Manual: Security in Telecommunications and Information Technology • http://www.itu.int/pub/T-HDB-SEC.05-2011 Geneva, Switzerland, 15-16 September 2014 18