ITU-T Perspectives on the Standards-Based Security Landscape  (SG 17 Main Focus)
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)

on

  • 1,866 views

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus)

Statistics

Views

Total Views
1,866
Views on SlideShare
1,857
Embed Views
9

Actions

Likes
0
Downloads
15
Comments
0

2 Embeds 9

http://www.slideshare.net 7
http://www.linkedin.com 2

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus) Presentation Transcript

  • 1. ITU-T Perspectives on the Standards-Based Security Landscape (SG 17 Main Focus) www.oasis-open.org Abbie Barbir, Ph.D. [email_address] ITU-T Q6/17 Cybersecurity Question Rapporteour OASIS IDTrust MS Steering Committe OASIS Telecom MS Co-chair OASIS TAB ISO JTC1 CAC SC6 Vice-Chair Senior Advisor CEA, SOA, Web Services, IdM, Security Strategic Standards Nortel
  • 2. www.oasis-open.org
    • Introduction to ITU
    • Security work at ITU Study Groups
    • SG 17 Security work
    • Higlight of Current Activities
    • Challenges
    Outline
  • 3. What is International Telecommunication Union (ITU) ?
    • Headquartered in Geneva, is the UN specialized agency for telecom
    • SG 17, Security, Languages and Telecommunication Software
      • Lead Study Group on Telecommunication Security
    • SG 2, Operational Aspects of Service Provision, Networks and Performance
    • SG 4, Telecommunication Management
    • SG 5, Protection Against Electromagnetic Environment Effects
    • SG 9, Integrated Broadband Cable Networks and Television and Sound Transmission
    • SG 11, Signalling Requirements and Protocols
    • SG 13, Next Generation Networks
    • SG 15, Optical and Other Transport Network Infrastructures
    • SG 16, Multimedia Terminals, Systems and Applications
    • SG 19, Mobile Telecommunication Networks
    ITU-T Telecommunication standardization of network and service aspects ITU-D Assisting implementation and operation of telecommunications in developing countries ITU-R Radiocommunication standardization and global radio spectrum management Study Group Organization (TSAG) (WTSA)
  • 4. Strategic Direction
    • Cybersecurity – one of the top priorities of the ITU
    • ITU’s role in implementing the outcomes of the World Summit on the Information Society (WSIS) Plenipotentiary Resolution 140 (2006)
      • Study of definitions and terminology relating to building confidence and security in the use of information and communication technologies Plenipotentiary Resolution 149 (2006)
    • WTSA-04 Resolution 50, Cybersecurity – Instructs the Director of TSB to develop a plan to undertake evaluations of ITU-T “existing and evolving Recommendations, and especially signalling and communications protocol Recommendations with respect to their robustness of design and potential for exploitation by malicious parties to interfere destructively with their deployment”
    • WTSA-04 Resolution 52, Countering spam by technical means – Instructs relevant study groups “to develop, as a matter of urgency, technical Recommendations, including required definitions, on countering spam”
  • 5. Highlights of current activities (1)
    • ITU Global Cybersecurity Agenda (GCA)
      • A Framework for international cooperation in cybersecurity
      • Five key work areas: Legal, Technical, Organisational, Capacity Building, International Cooperation
      • High-Level Experts (HLEG) working on global strategies
        • GCA/HLEG met 26 June 2008 to agree upon a set of recommendations on all five work areas for presentation to ITU Secretary-General
    • ISO/IEC/ITU-T Strategic Advisory Group on Security
      • Coordinates security work and identifies areas where new standardization initiatives may be warranted. Portal established. Workshops conducted.
    • Identity Management
      • Effort jump started by IdM Focus Group which produced 6 substantial reports (265 pages) in 9 months
      • JCA – IdM and IdM-GSI established – main work is in SGs 17 and 13
  • 6.
    • Core security (SG 17)
      • Covering frameworks, cybersecurity, countering spam, home networks, mobile, web services, secure applications, telebiometrics, etc.
      • Work underway on additional topics including IPTV, multicast, security; risk management and incident management; traceback, Bots, Privacy,
      • Questionnaire issued to developing countries to ascertain their security needs
      • Updated security roadmap/database, compendia, manual; strengthened coordination
    • Security for NGN (SG 13)
      • Y.2701: Security Requirements for NGN Release 1
      • Y.2702: NGN Authentication and Authorization Requirements
      • Y.NGN SecMechanisms: NGN Security Mechanisms and Procedures
      • Y.NGN Certificate: NGN Certificate Management
      • Y.AAA: Application of AAA for Network Access Control in UNI and ANI over NGN
    Highlights of current activities (2)
  • 7. Identity Connecting users with services and with others (Federation) Whatever you’re doing (applications) Collaboration Voice Telephony ERP Smart Phone Wherever you are (across various access types) Whatever you’re using (devices) Video Web Apps
    • Network Identity is essential
    • Need end-to-end trust model
    PC
    • People have multiple identities, each within a specific context or domain
      • Work – me@company.com
      • Family – me@smith.family
      • Hobby – me@icedevils.team
      • Volunteer – me@association.org
    At your Desk Managed Office In the Air On the Road In Town PDA Cellular At Home
  • 8. Challenges
    • Addressing security to enhance trust and confidence of users in networks, applications and services
      • With global cyberspace, what are the security priorities for the ITU with its government / private sector partnership?
      • Need for top-down strategic direction to complement bottom-up, contribution-driven process
      • Balance between centralized and distributed efforts on security standards
      • Legal and regulatory aspects of cybersecurity, spam, identity/privacy
      • Address full cycle – vulnerabilities, threats and risk analysis; prevention; detection; response and mitigation; forensics; learning
      • Marketplace acceptance of Information Security Management System (ISMS) standards (ISO/IEC 27000-series and ITU-T X.1051) – the security equivalent to ISO 9000-series
      • Effective cooperation and collaboration across the many bodies doing cybersecurity work
      • Informal security experts network – needs commitment
      • There is no “silver bullet” for Cybersecurity
  • 9. Some useful web resources
    • ITU-T Home page http://www.itu.int/ITU-T/
    • Security Roadmap http://www.itu.int/ITU-T/studygroups/com17/ict/index.html
    • Security Manual http://www.itu.int/publ/T-HDB-SEC.03-2006/en
    • Cybersecurity Portal http://www.itu.int/cybersecurity/
    • Cybersecurity Gateway http://www.itu.int/cybersecurity/gateway/index.html
    • Recommendations http://www.itu.int/ITU-T/publications/recs.html
    • ITU-T Lighthouse http://www.itu.int/ITU-T/lighthouse/index.phtml
    • ITU-T Workshops http://www.itu.int/ITU-T/worksem/index.html
    • LSG on Security http://www.itu.int/ITU-T/studygroups/com17/tel-security.html
  • 10. www.oasis-open.org Backup
  • 11. NGN architecture overview (Y.2012) Transport stratum Service stratum Control Media Management Functions A NI Transport C ontrol Functions Resource and Admission Control Functions NNI UNI Application Support Functions & Service Support Functions Applications Transport Functions End-User Functions Other Networks Service Control Functions Network Attachment Control Functions Service User Profiles T ransport User Profiles
  • 12. NGN architecture overview (Y.2012)
    • Packet-based network with QoS support and Security
    • Separation between Services and Transport
    • Access can be provided using many underlying technologies
      • Should be reflected in policy
    • Decoupling of service provision from network
    • Support wide range of services/applications
      • Converged services between Fixed/Mobile
    • Broadband capabilities with end-to-end QoS
    • Compliant with regulatory requirements
      • Emergency communications, security, privacy, lawful interception
      • ENUM Resources, Domain Names/ Internet Addresses
    Transport stratum Service stratum Control Media Management Functions A NI Transport C ontrol Functions Resource and Admission Control Functions Network Attachment Control Functions NNI UNI Application Support Functions & Service Support Functions Applications Transport Functions End-User Functions Other Networks Service Control Functions Service User Profiles T ransport User Profiles
  • 13. NGN Security Trust Model Trusted Zone Trusted but Vulnerable Zone Untrusted Zone Network Elements controlled by the NGN provider Network Elements not always controlled by the NGN provider NGN network Elements Network Border Elements (NBE) TE-BE TE TE Provider- controlled Equipment TE-BE TE TE
  • 14. NGN Peering Trust Model Trusted Zone Trusted but Vulnerable Zone Untrusted Zone NGN network Elements Domain Border Elements (DBE) NGN network Elements Domain Border Elements (DBE) Provider B from Provider A’s point of view Provider A