Presentation on theme: "Security / Cybersecurity"— Presentation transcript:
1Security / Cybersecurity DOCUMENT #:GSC13-XXXX-nnFOR:PresentationSOURCE:ITUAGENDA ITEM:CONTACT(S):Herbert BertineSecurity / CybersecurityITUHerbert Bertine, Chairman ITU-T Study Group 17Submission Date: July 1, 2008
2Cybersecurity – one of the top priorities of the ITU Strategic DirectionCybersecurity – one of the top priorities of the ITUPlenipotentiary Resolution 140 (2006), ITU’s role in implementing the outcomes of the World Summit on the Information Society – The important moderator/facilitator role of ITU in action line C5 (building confidence and security in the use of ICTs).Plenipotentiary Resolution 149 (2006), Study of definitions and terminology relating to building confidence and security in the use of information and communication technologiesWTSA-04 Resolution 50, Cybersecurity – Instructs the Director of TSB to develop a plan to undertake evaluations of ITU-T “existing and evolving Recommendations, and especially signalling and communications protocol Recommendations with respect to their robustness of design and potential for exploitation by malicious parties to interfere destructively with their deployment”WTSA-04 Resolution 51, Combating spam – Instructs the Director of TSB to “prepare urgently a report to the Council on relevant ITU and other international initiatives for countering spam, and to propose possible follow-up actions” - DoneWTSA-04 Resolution 52, Countering spam by technical means – Instructs relevant study groups “to develop, as a matter of urgency, technical Recommendations, including required definitions, on countering spam”
3Highlights of current activities (1) ITU Global Cybersecurity Agenda (GCA)A Framework for international cooperation in cybersecurityITU response to its role as sole Facilitator for WSIS Action Line C5Five key work areas: Legal, Technical, Organisational, Capacity Building, International CooperationWorld renowned Group of High-Level Experts (HLEG) working on global strategiesGCA/HLEG met 26 June 2008 to agree upon a set of recommendations on all five work areas for presentation to ITU Secretary-GeneralISO/IEC/ITU-T Strategic Advisory Group on SecurityCoordinates security work and identifies areas where new standardization initiatives may be warranted. Portal established. Workshops conducted.Identity ManagementEffort jump started by IdM Focus Group which produced 6 substantial reports (265 pages) in 9 monthsJCA –IdM and IDM-GSI established – main work is in SGs 17 and 13First IdM Recommendation – X.1250, Requirements for global identity management trust and interoperability - now in approval process
4Highlights of current activities (2) Core security (SG 17)Approved 14 texts in 2007, 17 so far in 2008, 15 more for action in September 2008Summaries of Recommendations under development are available at:Covering frameworks, cybersecurity, countering spam, home networks, mobile, web services, secure applications, ISMS, telebiometrics, etc.Work underway on additional topics including IPTV, multicast, and USN security; risk management and incident management; tracebackQuestionnaire issued to developing countries to ascertain their security needsUpdated security roadmap/database, compendia, manual; strengthened coordinationSecurity for NGNY.2701, Security Requirements for NGN Release 1 - publishedY.2702, NGN authentication and authorization requirements – determined
5There is no “silver bullet” for cybersecurity ChallengesAddressing security to enhance trust and confidence of users in networks, applications and servicesWith global cyberspace, what are the security priorities for the ITU with its government / private sector partnership?Need for top-down strategic direction to complement bottom-up, contribution-driven processBalance between centralized and distributed efforts on security standardsLegal and regulatory aspects of cybersecurity, spam, identity/privacyAddress full cycle – vulnerabilities, threats and risk analysis; prevention; detection; response and mitigation; forensics; learningAgree uniform definitions of cybersecurity terms and definitionsMarketplace acceptance of Information Security Management System (ISMS) standards (ISO/IEC series and ITU-T X.1051) – the security equivalent to ISO 9000-seriesEffective cooperation and collaboration across the many bodies doing cybersecurity workPSO help is needed in keeping security database up-to-dateInformal security experts network – needs commitmentThere is no “silver bullet” for cybersecurity
6Next Steps/Actions for ITU-T All Study Groups have proposed Questions for next study periodMost study groups have Questions concerning securityQuestions are mainly evolution of existing work programSee Supplemental InformationThe World Telecommunication Standardization Assembly (WTSA) in October 2008 will make decisions on the priorities, work program (Questions) and organization of Study Groups, including security / cybersecurity workMeanwhile, the present work program continues under the current structure – See Supplemental InformationE.g., Study Groups 17 and 13 will each meet in September to approve additional security RecommendationsA new edition of the ITU-T “Security Manual” is scheduled for October 2008
7Proposed revision to Resolution Resolution GSC-12/19, CybersecurityAdd a new Resolves follows:5) supply updated information on their security standards work for inclusion in the ICT Security Standards Roadmap, a database of security standards hosted by the ITU-T at:
8Supplemental Information Security activitiesITU General SecretariatTelecommunication Standardization Sector (ITU-T)Radiocommunication Sector (ITU-R)Telecommunication Development Sector (ITU-D)Useful web resources
9Supplemental Information ITUGeneral SecretariatCorporate Strategy Division
10ITU Global Cybersecurity Agenda A Framework for InternationalCooperation in Cybersecurity
11Issues and Challenges Constant evolution of the nature of cyberthreats Major challenge is to develop harmonized and comprehensiveglobal strategies at the international levelVulnerabilities in software and hardware applications and servicesLow entry barriers for cyber-criminalsLoopholes in current legal frameworksAbsence of appropriate organizational structuresInadequate cooperation among various stakeholdersGlobal problem which cannot be solved by any single entity(country or organization)Increasing sophistication of cybercrime
12WSIS and Cybersecurity Confidence and security are amongthe main pillars of the information society“Strengthening the trust framework, including information securityand network security, authentication, privacy and consumer protection, is aprerequisite for the development of the Information Society and for buildingconfidence among users of ICTs. “WSIS Geneva Declaration of Principles, Para 35“We reaffirm the necessity to further promote, develop and implement incooperation with all stakeholders a global culture of cyber-security, as outlinedin UNGA Resolution 57/239 and other relevant regional frameworks.”WSIS Tunis Agenda, Para 39
13Third Facilitation Meeting 22-23 May 2008, ITU Headquarters, Geneva ITU’s Role as WSIS C5 FACILITATORAt the World Summit on the Information Society (WSIS), world leaders andgovernments entrusted ITU to take the leading role in coordinating internationalefforts on cyber-security, as the sole Facilitator of Action Line C5,“Building confidence and security in the use of ICTs”The International Telecommunication Union (ITU) provides the globalperspective and expertise needed to meet the challenges, with a track recordof brokering agreements between public and private interests on a levelplaying field ever since its inception in 1865.Third Facilitation Meeting22-23 May 2008, ITU Headquarters, Geneva
14A Global Strategy for Action The strategy for a solution must identify those existing national, regional and international initiatives, work with all relevant players to identify priorities and bring partners together with the goal of proposing global solutions to address the global challenges we face today.ITU Global Cybersecurity Agenda (GCA)A framework for international multi-stakeholder cooperation in cybersecurityITU Response to its role as sole Facilitator for WSIS Action Line C5World renowned Group of High Level Experts (HLEG) to develop global strategiesRepresenting main stakeholder groups working towards the same goals: Developing harmonized global strategies
15GCA Work Areas GCA rests on five pillars or work areas: Legal Measures Technical and ProceduralMeasuresOrganizational StructuresCapacity BuildingInternational Cooperation12345
16provided advice on strategies in all five work areas or pillars High-Level Experts Group (GCA/HLEG)High-LevelExpert Group(HLEG)provided advice on strategiesin all five work areas or pillarsA global multi-stakeholder think-tankmade up of high-level experts from:GovernmentsIndustryRegional and international organizationsResearch and academic institutionsIndividual expertsElaboration of global strategies for1 the development of a model cybercrime legislation2 the creation of appropriate national and regional organizational structures and policies on cybercrime3 the establishment of security criteria and accreditation schemes for software applications and systems4 the creation of a global framework for watch, warning and incident response5 the creation and endorsement of a generic and universal digital identity system6 the facilitation of human and institutional capacity-building7 international cooperation, dialogue and coordination
17GCA/HLEG Members Diversity of Participation Argentina Brazil Cameroon Canada China Egypt Estonia Germany Japan India IndonesiaItaly Malaysia Morocco Portugal Republic of Lithuania Russian Federation Saudi Arabia SouthAfrica Switzerland United StatesDiversity of ParticipationEcole Polytechnique Fédérale de Lausanne(EPFL), SwitzerlandInformation Security Institute, AustraliaMoscow Technical University ofCommunications, Russian FederationAfrican Telecommunication Union (ATU)Asia Pacific Economic CooperationTelecommunications (APECTEL)Commonwealth TelecommunicationsOrganisations (CTO)Council of EuropeDepartment of Economic andSocial Affairs (DESA)European Information and NetworkSecurity Agency (ENISA)International Criminal PoliceOrganization (Interpol)Organisation for Economic Co-operationand Development (OECD)Organisation International de la FrancophonieSociety for the Policing of Cyberspace (POLCYB)UMTS ForumUnited Nations Institute for Trainingand Research (UNITAR)United Nations Office on Drugs and CrimeAuthentrusBITEK International Inc.CybexCiscoGarlikIntel CorporationMicrosoft CorporationTélam S.E.VeriSign, Inc.Stein Schjolberg, Chief Judge,Moss Tingrett Court, NorwaySolange Ghernaouti-Helie,HEC-Université de Lausanne, SwitzerlandSy Goodman, Georgia Institute of Technology,United StatesNabil Kisrawi, Chairman of WG-Def,Syrian RepublicBruce Schneier, Security Technologist,Unites StatesMarco Gercke, Professor, Cologne University,Germany
18GCA/HLEG Leveraging expertise for international consensus On a Global level, from government, international organizations to industryFor a Harmonised approach to build synergies between initiativesThrough Comprehensive strategies on all levels123GCA/HLEG is building synergies with existing initiativesand working with stakeholders in these five key areas:Legal Measurese.g. Cybercrime legislation (Council of Europe), Moss Tingrett Court Norway, CybexTechnical and Procedural Measurese.g. Software (Microsoft) , hardware (Intel), Networking (CISCO), Security Apps/Services (Verisign), Global Standards and Development (ITU)Organisational Structurese.g. Ecole Polytechnique Fédérale de Lausanne (EPFL), Forum of Incident Response and Security Teams, OECDCapacity Buildinge.g. United Nations Institution for Training and Research (UNITAR), European Network and Information Security Agency (ENISA)International Cooperatione.g. Interpol, United Nations Office on Drug and Crime (UNODC)
19HLEGThe HLEG work is an ongoing dynamic process with information-sharing and interaction relating to the elaboration of Global Strategies to meet the goals of the GCA and the ITU role as sole facilitator for WSIS Action Line C.5.Three meetings held:First Meeting of the HLEG held on 5 October 2007Second Meeting of the HLEG held on 21 May 2008Third Meeting of the HLEG held on 26 June 2008Chairman's Report:The results of the work of the HLEG, including recommendations, the views expressed during the meeting and additional information about the previous work of the HLEG are contained in the Chairman’s report which will be available at:
20GCA Sponsorship Programme – Join us! This Sponsorship programme – will ensure that all relevant stakeholders are aware of HLEG’s valuable work, will increase also a global understanding about how to work together to implement effective strategies. It will then be up to the stakeholders themselves – within their respective mandates and capabilities – to translate these strategies into concrete actions.GCA Sponsors will help to promote the goals of this initiative around the world by participating in high-profile business activities including publications, pubic campaigns, an annual conference and other events. In addition to the opportunity to meet with high-level decision makers, Sponsors also stand to enhance their image and credibility with their stakeholders.
21"The world must take action. It must stand united "The world must take action. It must stand united. This is not a problem any one nation can solve alone"Dr Óscar Arias SánchezNobel Peace Laureate,President of the Republic of Costa Rica,Patron of the Global Cybersecurity Agenda.
22Conclusions Towards a global Cyberpeace… The threats to global cybersecuritydemand a global framework!The magnitude of this issue calls for a coordinated global response to ensure that there are no safe havens for cybercriminals.ITU will act as a catalyst and facilitator for these partners to share experience and best practice, so as to step up efforts for a global response to cybercrime.In this way, working together, we can create a cyberspace that is somewhere safe for people to trade, learn and enjoy.Dr Hamadoun I. TouréSecretary-General, ITU
23ITU Global Cybersecurity Agenda & ITU Activities in Cybersecurity: For More information on:ITU Global Cybersecurity Agenda& ITU Activities in Cybersecurity:
24Supplemental Information ITU-T Telecommunication Standardization Sector
25ITU-T Security and Cybersecurity Activities SG 17, Security, Languages and Telecommunication SoftwareLead Study Group on Telecommunication SecuritySG 2, Operational Aspects of Service Provision, Networks and PerformanceSG 4, Telecommunication ManagementSG 5, Protection Against Electromagnetic Environment EffectsSG 9, Integrated Broadband Cable Networks and Television and Sound TransmissionSG 11, Signalling Requirements and ProtocolsSG 13, Next Generation NetworksSG 15, Optical and Other Transport Network InfrastructuresSG 16, Multimedia Terminals, Systems and ApplicationsSG 19, Mobile Telecommunication Networks
26ITU-T SG 17ITU-T Study Group 17 Security, Languages and Telecommunication SoftwareQ.4/17, Communications Systems Security ProjectQ.5/17, Security Architecture and FrameworkQ.6/17, Cyber SecurityQ.7/17, Security ManagementQ.8/17, TelebiometricsQ.9/17, Secure Communication ServicesQ.17/17, Countering Spam by Technical MeansQ.2/17, Directory Services, Directory Systems and Public-key/Attribute Certificates
27SG 17 – Q.4/17: Communications Systems Security Project ITU-T SG 17 Question 4Communications Systems Security ProjectOverall Security Coordination and VisionOutreach and promotional activitiesICT Security Standards RoadmapSecurity CompendiumITU-T Security manualFocus Group on Security Baseline For Network Operators
28SG 17 – Q.4/17 results achieved Successful workshop organized at start of Study Period to consider future direction of security standardsSecurity Standards Roadmap developed – includes security standards from ITU, ISO/IEC, IEEE, IETF, ATIS, ETSI, OASIS, 3GPPSecurity Compendium and Security Manual maintained and updatedSecurity Baseline for Network Operators developed
29Overall shortage of participants and contributors SG 17 – Q.4/17 challengesOverall shortage of participants and contributorsRoadmap issues/challenges:Taxonomy (always a challenge!)Finding out about new standards and when to post themAppearance of the databaseNeed to develop a short guide to the update process
30SG 17 – Q.4/17 progress since GSC-12 Security RoadmapThe listing of standards has been converted to a searchable databaseFurther updating is planned to ease navigationA new section (Part 5) has been added on (non-proprietary) Best Practices
31SG 17 – Q.4/17 focus for next study period Will continue to be primary SG contact for security coordination issuesWill maintain and update outreach materialSecurity ManualSecurity RoadmapSecurity CompendiumResponsibilities will be limited to coordination and outreach – no Recommendations
32SG 17 – Q.5/17: Security Architecture and Framework ITU-T SG 17 Question 5Security architecture and frameworkScopeStrategic directionChallengesMajor activities and accomplishmentsActions for the next study period
33SG 17 – Q.5/17 scopeX.1036X.1034, X.1035X.1031Supplement to X.800-X.849, Guidelines for implementing system and network securityRecommendation X.805 has been a foundation of Q.5/17 security studiesand shaped the scope of its work
34SG 17 – Q.5/17 scope (continued) Q.5/17 has developed Recommendations that further develop the concepts of X.805 and provide guidance on their implementationX.1031, Security architecture aspects of end users and networks in telecommunications - provides guidance on applying the concepts of the X.805 architecture for distributing the security controls between the telecommunication networks and the end user’s equipment.X.1034, Guidelines on Extensible Authentication Protocol based Authentication and Key Management in a Data Communication Network and X.1035, Password-Authenticated Key Exchange Protocol (PAK) - specify protocols and procedures that support functions of the Authentication security dimension.X.1036, Framework for creation, storage, distribution and enforcement of policies for network security further develops the concept of the security policy described in X.805.Supplement to X.800-X.849, Guidelines for implementing system and network security provides guidelines for implementing system and network security utilizing the concepts of X.805 and other security Recommendations and standards.
35SG 17 – Q.5/17 strategic direction Development of a comprehensive set of Recommendations for providing standard security solutions for telecommunications in collaboration with other Standards Development Organizations and ITU-T Study Groups.Studies and development of a trusted telecommunication network architecture that integrates advanced security technologies.Maintenance and enhancements of Recommendations in the X.800-series and X.103x-series.Coordination of studies on NGN security (with Question 15/13)
36SG 17 – Q.5/17 challengesAuthentication and key agreement is one of the most complex and challenging security procedures. Question 5/17 has developed Recommendations that contribute to the standards solutions for authentication and key managementX.1034, Guidelines on Extensible Authentication Protocol based Authentication and Key Management in a Data Communication NetworkEstablishes a framework for the EAP-based authentication and key management for securing the link layer in an end-to-end data communication network.Provides guidance on selection of the EAP methods.X.1035, Password-Authenticated Key Exchange Protocol (PAK)Specifies a protocol, which ensures mutual authentication of both parties in the act of establishing a symmetric cryptographic key via Diffie-Hellman exchange.
37SG 17 – Q.5/17 major accomplishments Recommendations developed by Q.5/17:X.1031, Security architecture aspects of end users and networks in telecommunicationsX.1034, Guidelines on Extensible Authentication Protocol based Authentication and Key Management in a Data Communication NetworkX.1035, Password-Authenticated Key Exchange Protocol (PAK)X.1036, Framework for creation, storage, distribution and enforcement of policies for network securityA Supplement developed by Q.5/17Supplement to X X.849 series Guidelines for implementing system and network securityOther technical documents prepared by Q.5/17In response to the WTSA Resolution 50, Question 5/17 has prepared Guidelines for designing secure protocols using ITU-T Recommendation X.805.Major coordination activity conducted by Q.5/17Question 5/17 has coordinated security studies with Question 15 of SG 13, NGN Security ensuring alignment of the standards work in both groups.
38SG 17 – Q.5/17 actions for next study period How should a comprehensive, coherent communications security solution be defined?What is the architecture for a comprehensive, coherent communications security solution?What is the framework for applying the security architecture in order to establish a new security solution?What is the framework for applying security architecture in order to assess (and consequently improve) an existing security solution?What are the architectural underpinnings for security?What new Recommendations may be required for providing security solutions in the changing environment?How should architectural standards be structured with respect to existing Recommendations on security?How should architectural standards be structured with respect to the existing advanced security technologies?How should the security framework Recommendations be modified to adapt them to emerging technologies and what new framework Recommendations may be required?How are security services applied to provide security solutions?
39Cyber Security SG 17 – Q.6/17: Cyber Security Motivation Scope ITU-T SG 17 Question 6Cyber SecurityMotivationScopeChallengesHighlights of activitiesActions for Next Study PeriodCollaboration with SDOs
40SG 17 – Q.6/17 motivationNetwork connectivity and ubiquitous access is central to today’s IT systemsWide spread access and loose coupling of interconnected IT systems and applications is a primary source of widespread vulnerabilityThreats such as: denial of service, theft of financial and personal data, network failures and disruption of voice and data telecommunications are on the riseNetwork protocols in use today were developed in an environment of trustMost new investments and development is dedicated to building new functionality and not on securing that functionalityAn understanding of cybersecurity is needed in order to build a foundation of knowledge that can aid in securing the networks of tomorrow
41SG 17 – Q.6/17 scope Definition of Cybersecurity Security of Telecommunications Network InfrastructureSecurity Knowledge and Awareness of Telecom Personnel and UsersSecurity Requirements for Design of New Communications Protocol and SystemsCommunications relating to CybersecuritySecurity Processes – Life-cycle Processes relating to Incident and VulnerabilitySecurity of Identity in Telecommunication NetworkLegal/Policy ConsiderationsIP traceback technologiesAuthentication Assurance
42SG 17 – Q.6/17 challengesHow should the current Recommendations be further enhanced for their wide deployment and usage?How to harmonize common IdM data models across the ITUHow to define and use the term Identity within the ITUHow to detect and predict future threats and risks to networksHow to harmonize various IdM solutionsWhat are the best strategies to improve CybersecurityHow to maintain a living list of IdM terms and definition and use it informally across the ITU
43SG 17 – Q.6/17 highlights of activities Completed RecommendationsNo.TitleX.1205Overview of CybersecurityX.1206A vendor-neutral framework for automatic checking of the presence of vulnerabilities information updateX.1207Guidelines for Internet Service Providers and End-users for Addressing the Risk of Spyware and Deceptive SoftwareX.1250*Requirements for global identity management trust and interoperabilityX.1303Common Alerting Protocol (CAP 1.1)* Currently in the approval process
44SG 17 – Q.6/17 highlights of activities (2) Recommendations under developmentITU-T X.eaa | ISO/IEC xxxx, Information technology – Security techniques – Entity authentication assuranceThis Recommendation | International Standard provides a framework for entity authentication assurance which is the quantification of the risks that an entity is who or what he/she/it claims to be. In other words, entity authentication assurance is a measure of the confidence or risks associated with the authentication process and mechanisms.ITU-T X.gopw, Guideline on preventing worm spreading in a data communication networkThis Recommendation describes worm and other malicious codes spreading patterns and scenarios in a data communication network. The Recommendation provides guidelines for protecting users and networks from such malicious codes.
45SG 17 – Q.6/17 highlights of activities (3) Recommendations under developmentITU-T X.idif, User Control enhanced digital identity interchange frameworkThis Recommendation defines a framework that covers how global interoperable digital identity interchange can be achieved and how an entity’s privacy is enhanced by providing an entity more control over the process of identity interchange. In addition, the Recommendation defines the general and functional requirements of the framework that should be satisfied. Based on the requirements, a framework is defined with basic functional building blocks for identity interchange and enhancing entity control.ITU-T X.idm-dm, Common identity data modelThis Recommendation develops a common data model for identity data that can be used to express identity related information among IdM systems.
46SG 17 – Q.6/17 actions for next study period Enhance current Recommendations to accelerate their adoptionWork with SG 2 in Trusted Service Provider Identifier (TSPID)Collaborate with Questions 5, 7, 9, 17/17 and with SG 2 in order to achieve better understanding of various aspects of network securityCollaborate with IETF, OASIS, ISO/IEC JTC1, Liberty Alliance and other standardization bodies on CybersecurityWork with OASIS on maintaining the OASIS Common Alerting Protocol V1.1 (ITU-T Recommendation X.1303)Study new Cybersecurity issues – How should ISPs deal with botnets, evaluating the output of appropriate bodies when available.Study technical aspects of Traceback techniquesJoint work is ISO/JTC1 SC 27 on Entity Authentication AssuranceProgress work with Liberty Alliance on Identity Authntication FrameworksWorking with SG 4 and SG 13 on common IdM Data Models.Developing frameworks for User control enhanced digital identity interchange frameworkDeveloping guideline on protection for personally identifiable information in RFID applicationDeveloping requirements for security information sharing frameworkDeveloping guideline on preventing worm spreading in a data communication networkMaintaining the IdM Lexicon document
47SG 17 – Q.6/17 collaboration with other SDOs ISO/IEC JTC 1/SC 27IEC/TC 25IETFIEEELiberty AllianceOASISW3C3GPPETSI/TISPAN
48SG 17 – Q.7/17: Security management ITU-T SG 17 Question 7Security managementScopeChallengesHighlights of activitiesActions for Next Study PeriodCollaboration with SDOs
49SG 17 – Q.7/17 scopeFor telecommunications organizations, information and the supporting processes, facilities, networks and communications medias are all important business assets.In order for telecommunications organizations to appropriately manage these business assets and to correctly continue the business activity, Information Security Management is extremely necessary.The scope of this question is to provide GUIDELINES and BASELINES of Information Security Management to be appropriately applied for telecommunications organizations. Studies related on this issue can be a little bit extended to cover the following items:- information security management guidelines (baseline) - information incident management guidelines - risk management and risk profiles guidelines - assets management guidelines - policy management guidelines - information security governance - etc.
51SG 17 – Q.7/17 challengesHow should information assets in telecommunications systems be identified and managed?How should information security policy for telecommunications systems be identified and managed?How should specific management issues for telecommunications organizations be identified?How should information security management system (ISMS) for telecommunications organizations be properly constructed by using the existing standards (ISO/IEC and ITU-T)?How should measurement of information security management in telecommunications be identified and managed?How should an information security governance framework be identified and managed?How should the small and medium telecommunications organizations be managed and applied for security?
52SG 17 – Q.7/17 highlights of achievements RecommendationsNo.TitleX.1051Information security management guideline for telecommunications organizations based on ISO/IEC 27002X.rmg*Risk management and risk profile guideX.sim*Security incident management guidelines for telecommunicationsX.ismf*Information Security Management Framework for Telecommunications* Currently under development
53SG 17 – Q.7/17 actions for next study period Review the existing management Recommendations/Standards in ITU-T and ISO/IEC management standards as for assets identification and security policy management.Study and develop a methodology of assets identification and policy management for telecommunications based on the concept of information security management (X.1051).Study and develop information security management framework for telecommunications based on the concept of information security management (X.1051).Study and develop security management guidelines for small and medium telecommunications based on the concept of information security management (X.1051).Study and develop a methodology to construct information security management system (ISMS) for telecommunications organizations based on the existing standards (ISO/IEC and ITU-T).Study and develop an information security governance framework for telecommunications that encompasses information technology and information security management.
54SG 17 – Q.7/17 collaboration with SDOs ISO/IEC JTC 1/SC27ETSITTCNIST
55SG 17 – Q.8/17: Telebiometrics ITU-T SG 17 Question 8TelebiometricsScopeStrategic DirectionChallengesHighlights of activitiesActions for Next Study PeriodCollaboration with SDOs
57SG 17 – Q.8/17 strategic direction Security and Protectionfor telebiometric application systemsProtection proceduresSystem mechanismamong Client/Server/TTPBioAPI interworking protocolAuthentication infrastructureBiometric Digital keySafetyin interaction with sensors
58SG 17 – Q.8/17 challengesHow should security countermeasures be assessed for particular applications of telebiometrics?How can identification and authentication of users be improved by the use of interoperable models for safe and secure telebiometric methods?What mechanisms need to be supported to ensure safe and secure manipulation of biometric data in any application of telebiometrics, e.g., telemedicine or telehealth?How should the current Recommendations be further enhanced for their wide deployment and usage?
59SG 17 – Q.8/17 highlights of activities Approved RecommendationsNo.TitleX.1082Telebiometrics related to human physiologyX.1083BioAPI Interworking ProtocolX.1084Telebiometrics system mechanism – Part 1: General biometric authentication protocol and system model profiles on telecommunication systemsX.1088Telebiometrics digital key – A framework for biometric digital key generation and protectionX.1089Telebiometrics authentication infrastructure
60SG 17 – Q.8/17 actions for next study period Enhance current Recommendations to accelerate their adoption to various telebiometric applications and populate the telebiometric database.Review the similarities and differences among the existing telebiometrics Recommendations in ITU-T and ISO/IEC standards.Study and develop security requirements and guidelines for any application of telebiometrics.Study and develop requirements for evaluating security, conformance and interoperability with privacy protection techniques for any application of telebiometrics.Study and develop requirements for telebiometric applications in a high functionality network.Study and develop requirements for telebiometric multi-factor authentication techniques based on biometric data protection and biometric encryption.Study and develop requirements for appropriate generic protocols providing safety, security, privacy protection, and consent “for manipulating biometric data” in any application of telebiometrics, e.g., telemedicine or telehealth.Prepare a manual on telebiometrics.
61SG 17 – Q.8/17 collaboration with other SDOs ISO/IEC JTC 1/SCs 17, 27 and 37ISO/TC 68 and TC 12IEC/TC 25IETFIEEEInternational Bureau of Weight and Measurement (BIPM)
62Secure Communication Services SG 17 – Q.9/17: Secure communication servicesITU-T SG 17 Question 9Secure Communication ServicesFocusPosition of each topicStrategic directionChallengesMajor achievementsSecurity work proposed for next study period
63SG 17 – Q.9/17 focusDevelop a set of standards of secure application services, includingMobile securityHome network securityWeb Services securitySecure application servicesNID/USN security Under studyMulticast security Under studyIPTV security Under studySecurityAuthentication - to know who is accessing your dataPrivacy - to protect your data from intrusionEncryption - to secure the data from misuse or abuseBiometrics - 'what you are‘replace ‘what you know' - items, such as PIN numbersaugment 'what you have‘ - forms of identification, such as cardsX.509Public-key and attribute certificate frameworksX.842Guidelines for the use and management of Trusted Third Party servicesX.843Specification of TTP services to support the application of digital signaturesRecommendation X.509Information technology - The Directory: Public-key and attribute certificate frameworksThis Recommendation defines a framework for public-key certificates and attribute certificates. These frameworks may be used to profile application to Public Key Infrastructure (PKI) and Privilege Management Infrastructures (PMI). Also, this Recommendation defines a framework for the provision of authentication services by Directory to its users. It describes two level of authentication: simple authentication, using a password as a verification of clamed identity; and strong authentication, involving credentials formed using cryptographic techniques.ApprovedInformation technology – Security techniques – Guidelines for the use and management of Trusted Third Party servicesThis Recommendation provides guidance for the use and management of Trusted Third Party (TTP) services, a clear definition of the basic duties and services provided, their description and their purpose, and the roles and liabilities of TTPs and entities using their services. This Recommendation identifies different major categories of TTP services including time stamping, non-repudiation, key management, certificate management, and electronic notary public.Q13/7Information technology – Security techniques – Specification of TTP services to support the application of digital signaturesThis Recommendation defines the services required to support the application of digital signatures for non repudiation of creation of a document. Since this implies integrity of the document and authenticity of the creator, the services described can also be combined to implement integrity and authenticity services.
64SG 17 – Q.9/17 position of each topic MobileNetworkHomeNetworkHome GatewayMobile TerminalHome network securityMobile securityHomeNetworkSTBContent ProviderIPTV security/Multicast securityCore Open NetworkUbiquitous Sensor NetworkUSN Application ServerUSN gatewayUSN securityNID tagNID securityNID Application ServerNID readerSecure application services/Web Services securityApplication ServerClient
65SG 17 – Q.9/17 strategic direction For developing the draft Recommendations on IPTV security matters:Participate the ITU-T IPTV-GSI event (January – December, 2008) to develop them being consistent with relevant Recommendations being developed by other QuestionsPropose X.iptvsec-1 (Requirements and architecture for IPTV security matter) for consent by September 2008, to meet urgent market needBased on X.iptvsec-1, continue to study a set of possible draft Recommendations which complement X.iptvsec-1 technologicallyContinue to develop a set of draft Recommendations in domain-specific areas:Mobile network, Home network, (mobile) Web Services, application services, NID/USN service, IPTV service multicasting service, etc.Continue to adopt or update the mature standards (i.e., SAML, XACML) developed by other SDOs, especially by OASIS, in the area of Web Services securityDevelop a common text of X.usnsec-1 (Security framework for USN) with ISO/IEC JTC 1/SC 6 (as of June 2008)Keep maintaining liaison activities with 3GPP, 3GPP2, JTC 1/SC 6, 25, 27 to develop the relevant draft RecommendationsSecurityAuthentication - to know who is accessing your dataPrivacy - to protect your data from intrusionEncryption - to secure the data from misuse or abuseBiometrics - 'what you are‘replace ‘what you know' - items, such as PIN numbersaugment 'what you have‘ - forms of identification, such as cardsX.509Public-key and attribute certificate frameworksX.842Guidelines for the use and management of Trusted Third Party servicesX.843Specification of TTP services to support the application of digital signaturesRecommendation X.509Information technology - The Directory: Public-key and attribute certificate frameworksThis Recommendation defines a framework for public-key certificates and attribute certificates. These frameworks may be used to profile application to Public Key Infrastructure (PKI) and Privilege Management Infrastructures (PMI). Also, this Recommendation defines a framework for the provision of authentication services by Directory to its users. It describes two level of authentication: simple authentication, using a password as a verification of clamed identity; and strong authentication, involving credentials formed using cryptographic techniques.ApprovedInformation technology – Security techniques – Guidelines for the use and management of Trusted Third Party servicesThis Recommendation provides guidance for the use and management of Trusted Third Party (TTP) services, a clear definition of the basic duties and services provided, their description and their purpose, and the roles and liabilities of TTPs and entities using their services. This Recommendation identifies different major categories of TTP services including time stamping, non-repudiation, key management, certificate management, and electronic notary public.Q13/7Information technology – Security techniques – Specification of TTP services to support the application of digital signaturesThis Recommendation defines the services required to support the application of digital signatures for non repudiation of creation of a document. Since this implies integrity of the document and authenticity of the creator, the services described can also be combined to implement integrity and authenticity services.
66SG 17 – Q.9/17 challengesFor the domain-specific draft Recommendations, it needs to strengthen the coordination work with other relevant Questions/SDOs to develop them to be consistent with their work.During this Study period, Q.9/17 has been focused on the security framework for various domain-specific networks. However, from now on it should be emphasized to develop the pragmatic draft Recommendations which have significant impact on industry for the domain-specific networks with the collaboration with industries, other relevant SDOs and network/service providers.For developing the draft Recommendations on IPTV security matters, the various detailed work items should continue to be identified in the future.SecurityAuthentication - to know who is accessing your dataPrivacy - to protect your data from intrusionEncryption - to secure the data from misuse or abuseBiometrics - 'what you are‘replace ‘what you know' - items, such as PIN numbersaugment 'what you have‘ - forms of identification, such as cardsX.509Public-key and attribute certificate frameworksX.842Guidelines for the use and management of Trusted Third Party servicesX.843Specification of TTP services to support the application of digital signaturesRecommendation X.509Information technology - The Directory: Public-key and attribute certificate frameworksThis Recommendation defines a framework for public-key certificates and attribute certificates. These frameworks may be used to profile application to Public Key Infrastructure (PKI) and Privilege Management Infrastructures (PMI). Also, this Recommendation defines a framework for the provision of authentication services by Directory to its users. It describes two level of authentication: simple authentication, using a password as a verification of clamed identity; and strong authentication, involving credentials formed using cryptographic techniques.ApprovedInformation technology – Security techniques – Guidelines for the use and management of Trusted Third Party servicesThis Recommendation provides guidance for the use and management of Trusted Third Party (TTP) services, a clear definition of the basic duties and services provided, their description and their purpose, and the roles and liabilities of TTPs and entities using their services. This Recommendation identifies different major categories of TTP services including time stamping, non-repudiation, key management, certificate management, and electronic notary public.Q13/7Information technology – Security techniques – Specification of TTP services to support the application of digital signaturesThis Recommendation defines the services required to support the application of digital signatures for non repudiation of creation of a document. Since this implies integrity of the document and authenticity of the creator, the services described can also be combined to implement integrity and authenticity services.
67SG 17 – Q.9/17 major achievements Mobile securityX.1123, General security value added service (policy) for mobile data communication, Approved 2007X.1124, Authentication architecture in mobile end-to-end data communication, Approved 2007X.1125, Correlative reacting system in mobile network, Approved 2007NID securityX.1171, Framework for Protection of Personally Identifiable Information in Networked ID Services, Consented 2008Home network securityX.1111, Framework for security technologies for home network, Approved 2007X.1112, Certificate profile for the device in the home network, Approved 2007X.1113, Guideline on user authentication mechanisms for home network service, Approved 2007X.homesec-4 Authorization framework for home network, to be consented 2008USN securityX.usnsec-1 Requirement and Framework for Ubiquitous Sensor Network, New work item in 2007
68SG 17 – Q.9/17 major achievements (2) Multicast SecurityX.mcsec-,1 Security Requirement and Framework in Multicast communication, New work item in 2007IPTV securityX.iptvsec-1, Functional Requirements and architecture for IPTV security aspects, New work item in 2008X.iptvsec-2, Requirement and mechanism for Secure Transcodable Scheme New work item in 2008X.iptvsec-3, Key management framework for secure IPTV communications, New work item in 2008Web Services securityX.1143, Security architecture for message security in mobile Web Services, Approved 2007Secure applications servicesX.1151, Guideline on strong password authentication protocols, Approved 2007X.1152, Secure end-to-end data communication techniques using Trusted Third Party services, Consented 2008X.1161, Framework for secure peer-to-peer communications, Consented 2008X.1162, Security architecture and operations for peer-to-peer network, Consented 2008
69SG 17 – Q.9/17 work for next study period Divide Q.9/17 into two Questions: Q.O/17 and Q.P/17, considering the enormous workloads.Q.9/17 for current Study PeriodQ.O/17 for Next Study PeriodSecure Communication ServiceSecurity aspects for ubiquitoustelecommunication serviceMobile SecurityHome network securityNID/USN securityMulticast securityIPTV security, etc.Mobile SecurityHome network securityNID/USN securityMulticast securityIPTV securityQ.P/17 for Next Study PeriodWeb Service securitySecure application securityWeb Service securitySecure application service, etc.Secure application services
70SG 17 – Q.17/17: Countering spam by technical means ITU-T SG 17 Question 17Countering spam by technical meansScopeStrategic directionChallengesHighlights of activitiesActions for next study periodCollaboration with SDOs
71SG 17 – Q.17/17 scopeDevelop a set of standards for countering spam by technical means, including:General technical strategies and protocols for countering spamGuidelines, frameworks and protocols for countering spam, IP multimedia spam, SMS spam and other new types of spam
72SG 17 – Q.17/17 strategic direction Technologies involved in countering spam (X.1240)Framework Recommendations IP multimedia application area (X.fcsip)Technical framework for countering spam (X.1241)Overall aspects of IP multimedia application spam (X.1244)Technology Recommendations:Interactive countering spam gateway system (X.tcs-1) etc.Technical means for countering spam (X.tcs) TBDTechnical strategies on countering spam (X.1231)SMS spam Filtering System Based on Users’ Rules (X.ssf)
73SG 17 – Q.17/17 challengesWhat risks does spam pose to the telecommunication network?What technical factors associated with the telecommunication network contribute to the difficulty of identifying the sources of spam?How can new technologies lead to opportunities to counter spam and enhance the security of the telecommunication network?Do advanced telecommunication network technologies (for example, SMS, instant messaging, VoIP) offer unique opportunities for spam that require unique solutions?What technical work is already being undertaken within the IETF, in other fora, and by private sector entities to address the problem of spam?What telecommunication network standardization work, if any, is needed to effectively counter spam as it relates to the stability and robustness of the telecommunication network?
74SG 17 – Q.17/17 highlights of activities Approved RecommendationsNo.TitleX.1231Technical Strategies on Countering SpamX.1240Technologies involved in countering spamX.1241Technical framework for countering spamX.1244*Overall aspects of IP multimedia application spam* Currently in approval process
75SG 17 – Q.17/17 actions for next study period Act as the lead group in ITU-T on technical means for countering spamEstablish effective cooperation with the relevant ITU Study Groups, other standard bodies and appropriate consortia and fora.Identify and examine the telecommunication network security risks introduced by the constantly changing nature of spam.Develop a comprehensive and up-to-date resource list of the existing technical measures for countering spam in a telecommunication network that are in use or under development.Determine whether new Recommendations or enhancements to existing Recommendations, including methods to combat delivery of spyware, worm, phishing, and other malicious contents via spam and combat compromised networked equipment including botnet delivering spam.Provide regular updates to the Telecommunication Standardization Advisory Group and to the Director of the Telecommunication Standardization Bureau to include in the annual report to Council.
77SG 17 – Q.2/17 - X.500 security aspects ITU-T SG 17 Question 2Directory Services, Directory Systems and Public-key/Attribute CertificatesX.509 as basis for other specificationsCertificatesPublic-Key Infrastructure (PKI)Privilege Management Infrastructure (PMI)Protecting directory informationUser authenticationAccess controlData privacy protection
78SG 17 – Q.2/17 - X.509 applicability The X.509 specification is the base for many other specifications:Secure Socket Layer (SSL)The IETF Internet X.509 Public Key Infrastructure (PKIX) activityThe IETF Secure / Multipurpose Internet Mail Extensions (S/MIME) activityThe ETSI Electronic Signatures and Infrastructures (ESI) activityEtc.
79SG 17 – Q.2/17 - X.509 applicability (2) The X.509 specification is the base for:SecureOnline bankingMedical electronic journalsOnline public serviceEtc.In short: The whole electronic world
80SG 17 – Q.2/17 - Public-Key Infrastructure (PKI) PKI is an infrastructure for managing certificates. It consists of one or more Certification Authorities for issuing certificates in a secure way following a set of policies.It includes maintaining information about certificates been revoked.Directories are major components of the infrastructure.
81SG 17 – Q.2/17 - Privilege Management Infrastructure (PMI) PMI is an infrastructure for managing authorization using attribute certificates. It consists of one or more Attribute Authorities for issuing attribute certificates in a secure way.It includes maintaining information about attribute certificates been revoked.Directories are major components of the infrastructure.Recent development - (PMI) has been extended to allow privileges obtained in one domain to be used in an other domain (federation of privileges).
82SG 17 – Q.2/17 - Protecting Directory Information Authentication of usersNoneNameName + passwordName + protected passwordStrong authentication based on X.509
83SG 17 – Q.2/17 - Protecting Directory Information Access controlAccess control is about right-to-know (Who may do what based on level of authentication)X.500 has comprehensive access control featuresX.500 is the only directory specification having these features
84SG 17 – Q.2/17 - Protecting Directory Information Data Privacy ProtectionData Privacy Protection is about right-to-know and need-to-know.Protection against malicious searchesProtection against data trawlingMinority protection
85SG 17 – Q.2/17 - New security extension work Password policy, that is rules for administration of password to increase directory security:Password lifetimeMaintain password history (avoid reuse)Password qualityPassword warningsError signallingEtc.Part of next X.500 edition ( )
86Operational aspects of service provision, networks and performance ITU-T SG 2ITU-T Study Group 2Operational aspects of service provision, networks and performance
87SG 2 – Scope of security study Operational aspects such as prevention and detection of:FraudMisuseCorresponding operational measuresSecurity requirements
88SG 2 – Accomplishment Recommendations: E.156 Guidelines for ITU-T action on reported misuse of E.164 number resources E.408 Telecommunication networks security requirementsE.409 Incident organization and security incident handling: Guidelines for telecommunication organizationsNumerous Recommendations on operational aspects of network management
89Telecommunication management ITU-T SG 4ITU-T Study Group 4Telecommunication management
90SG 4 – Scope of security study Security of management planeManagement of security for telecommunications managementProtocols of securities for management
91SG 4 – Strategic direction Establishment of interface Recommendations among security function groups or entities for management of security (Enhancement of M.3410)Study on use of IdM in management planStudy on the management of IdMContinuation of protocol profiling for security management
92SG 4 – ChallengesFill the gap in security on management plane and management of its securityCollaboration with ATIS TMOC and ETSI TISPAN on the subject
93SG 4 – AccomplishmentConsent of Recommendation M.3410Guidelines and Requirements for Security Management Systems to Support Telecommunications Management
94SG 4 – Next stepsEnhancement of M.3016 series Recommendations for security of management planeEnhancement of M.3410 Recommendation for management of security for telecommunications managementEnhancement of Q.811 and Q.812, management protocol profiles from security subject perspective
95SG 4 – QuestionsWhat security mechanisms and protocols are required to support security of management for NGNs?What management mechanisms and protocols are required to support management of security for NGNs?What use of Service-Oriented Architecture concepts should be applied in specifying protocol and security Recommendations?What collaboration inside and outside the ITU-T is needed to develop protocol and security functions?
96Protection against electromagnetic environment effects ITU-T SG 5ITU-T Study Group 5Protection against electromagnetic environment effects
97SG 5 – ScopeTo provide guidance on the protection of Telecommunications and Data Centres against disruption of service and/or physical damage due to:Natural EM phenomenaLightning, Electrostatic Discharge (ESD)Interactions with the RF SpectrumElectromagnetic Compatibility (EMC)Man-Made/Malicious Electromagnetic threatsHigh-altitude EM Pulse (HEMP);High-Power EM weapons (HPEM);To provide guidance on the protection of electronic data from interception via EM means
98SG 5 – Strategic direction Do not reinvent the wheelReference existing K-Series Recommendations wherever possibleLightning, ESD, EMCDevelop effective liaisons with other International Standardization Organizations to exploit additional expertiseLiaison with IEC TC 77 – Electromagnetic Compatibility (EMC) – SC 77C – High Power Transient Phenomena – provided expertise in HEMP and HPEMLiaison with National Institute of Information and Communications Technology (NICT) of Japan – provided expertise on EM interception of dataApply existing expertise to the telecommunications and data centre domain
99SG 5 – Challenges Knowledge management EM intercept Liaisons with other bodies has granted access to rich veins of existing expertiseThis has taken time to assimilate and present within the context of a telecommunications and data centreEM interceptPreviously officially secret in some regions (i.e. previously known as TEMPEST within the US)
100SG 5 – Recent accomplishments A document set is plannedK.sec – basic introduction that references the following:K.hempK.hpemK.leakageK.sec_mitiExisting K-series Recommendations on lightningExisting K-series Recommendations on EMCSteady progress has been made on developing the document set
101SG 5 – Next steps/actions Development of document set continues with the following timingDocumentTitle of the RecommendationTimingK.secGuide for the application of electromagnetic security requirements - Basic Recommendation2011K.hempApplication of requirements against HEMP to telecommunication systems2008K.hpemApplication of requirements against HPEM to telecommunication systemsK.leakageTest method and requirements against information leak through unintentional EM emission2009K.secmitiMitigation methods against EM security threats
102ITU-T SG 9ITU-T Study Group 9Integrated broadband cable networks and television and sound transmission
103SG 9 – Scope of security work Security requirements are spread across multiple questions:Improve the security of conditional access systems used for television subscription, pay-per-view and similar services distributed to the home by cable television (Q3)Security, conditional access, protection against unauthorized copying, protection against unauthorized redistribution requirements to be supported by an universal integrated receiver or set-top box for the reception of cable television and other services (Q5)Security requirements and protocols associated with high-speed bidirectional data facilities intended to support, among other payloads, those utilizing Internet Protocols (IP) exploiting the broadband capacity provided by hybrid fiber/Coaxial (HFC) digital cable television systems (Q8)Security requirements and protocols for Voice over IP/Video over IP applications in IP-based cable television networks (Q9) Extend the security requirements for entertainment video delivery associated with cable network video service onto the home network (Q10)Provide all the security requirements for the network elements and services offered by cable operators
104SG 9 – Strategic direction for security for Cable Networks Network ElementsHome Networking – Devices and Applications- Link privacy for cable modem implementations J.125- Third generation Transmission systems – security services J.222.3- IP Cablecom security specification J.170- IP Cablecom 2 architecture including securityJ.360- Security features based on 3G mobile telecom system as modified for Cable J.366.7- IMS network domain security specification J.366.8- Generic authentication architecture specification J.366.9- A Residential Gateway to support delivery of cable data services J.192- Requirements for next generation set-top boxes J.193- High level requirements for DRM Bridge for Cable access Network to home network J.197- Next generation set-top box architecture J.290- IPTV requirements for secondary distribution J.700
105SG 9 – Challenges for cable networks security Authentication, privacy, access control and content protection both on the access network and the bridge to home network are key considerations for multi-media applications/servicesSecurity requirements for network elements in the access networks determine how the applications (voice, video and data) are transmitted securely to authenticated users/subscribersSecurity requirements for network elements in the home network such as residential gateway and set-top boxes meet the access control for the user
106SG 9 – Major accomplishments Approved 2 security requirements Recommendations:“Link Privacy for cable modems” (J.125)“Third generation transmission systems” (cable Modem and Cable Modem Termination System, J.222.3)Approved “IPTV requirements for secondary distribution” (J.700)Approved the Recommendation on “Component definition and interface specification for next generation set-top box” (J.293)
107SG 9 – Security work for next study period Security studies for the next study period will be continued in the following questions:Cable television delivery of digital services and applications that use Internet Protocols (IP) and/or packet-based dataVoice and video applications over cable TV networksFunctional requirements for a universal integrated receiver or set-top box for the reception of cable television and other servicesThe extension of cable-based services over broadband in Home NetworksSecurity requirements for IPTV interfaces for secondary distribution (identified in J.700)
108Signalling Requirements and Protocols ITU-T SG 11ITU-T Study Group 11Signalling Requirements and Protocols
109SG 11 – Scope of security work Each Question of SG11 has to consider security aspects to develop protocol Recommendations used for network control signalling, based on the general requirements developed by other SGs, such as SG 2, SG 13, SG 17 and SG 19.Q.7/11, entitled as “Signalling and control requirements and protocols to support attachment in NGN environments”, has specific requirements for authentication and authorization of users and terminals.
110SG 11 – Strategic direction Security consideration has been incorporated within the text for each Question of SG11.Various security arrangements are embedded within the protocols defined at various reference points, by reusing existing mechanisms defined by other organization (e.g., IETF and 3GPP).Strengthen the coordination on security issues across SGs, as well as among Questions within SG 11 by proposing a dedicated new Question on security coordination for the next study period.
111SG 11 – Challenges for secure protocols Design interface protocols which have various security mechanisms based on Recommendations / specifications developed by SG 17 and other SDOs.Special attention should be drawn to the interface between legacy telephone networks and emerging NGN.It would also be necessary to guide actual protocol implementations so that there will be no security holes, for example, by defining implementers’ guides.
112SG 11 – Recent accomplishments 24 Recommendations and 6 Supplements have been approved so far, regarding NGN protocols with security mechanisms embedded.The following two Recommendations have been approved at the January 2008 SG11 meeting in Q.7/11 in Network attachment control protocol work:Q.3201, “EAP-based security signalling protocol architecture.” Note - EAP: Extensible Authentication ProtocolQ , “Authentication protocols for interworking among 3GPP, WiMax and WLAN in NGN.”
113SG 11 – Security work for next study period New Question on security coordinationWhat is the content of an appropriate policy for the consideration of protocol security in the work of the Study Group?What are the means to assure that such a policy is being followed in practice?What exceptions to the general policy are permissible in the case of specific Recommendations?What is the impact of security-related work in other groups on the work of protocol security within this Study Group at the policy level?What are the means by which technical developments in protocol security achieved in other groups may be communicated to interested Questions in this Study Group, and the reverse?
114Next Generation Networks ITU-T SG 13ITU-T Study Group 13Next Generation Networks
115SG 13 – Scope of NGN security work in Q.15 Conduct NGN Security studies to develop network architectures that:Provide for maximal network and end-user resources protectionAllow for highly-distributed intelligence end-to-endAllow for co-existence of multiple networking technologiesProvide for end-to-end security mechanismsProvide for security solutions that apply over multiple administrative domainsProvide for secure Identity ManagementProvide for security solutions for IPTV that are cost-effective and have acceptable impact on the performance, quality of service, usability, and scalabilityProvide security guidance on NGN security to all Questions of SG 13 and other Study Groups
116SG 13 – Strategic direction for NGN security Y.2701 is a base for development of the detailedRecommendations on NGN SecurityIdentity Management has evolved intoa separate topic of the NGN security workY.2701 Security Requirements for NGN Release 1NGN IdM FrameworkY.2701 is built onapplicationof the conceptsof X.805to Y.2201 ,NGN requirementsand Y.2012,NGN Functional Require-ments and ArchitectureNGN IdM Use casesY.2702 NGN Authentication and Authorization RequirementsNGN AAANGN IdM RequirementsNGN Certificate ManagementNGN IdM MechanismsNGN Security MechanismsIdM Framework defines the concepts of the IdMIdM Use cases is a base for deriving the IdM requirementsIdM Mechanisms provide support for the requirements
117SG 13 – Challenges for NGN security Authentication is one of the most complex and challenging procedures in NGN security. The following study items of SG 13 are focused on various aspects of authentication:Y.2702, NGN Authentication and Authorization RequirementsNGN Security MechanismsNGN Certificate ManagementNGN Authentication Authorization and AccountingNGN IdM RequirementsNGN IdM Mechanisms
118SG 13 – Major security accomplishments Question 15/13 has:Achieved determination of the draft ITU-T Recommendation Y.2702, NGN Authentication and Authorization RequirementsDefined the direction for the studies of Identity Management (IdM) for NGN and started development of four ITU-T Recommendations on IdMProvided security expertise to other Questions and Study Groups through active participation in NGN-GSI and IdM-GSIContinued productive collaboration with ITU-T SG 17 - Lead Study Group on Telecommunication Security and started joint (with Q.6/17) development of Recommendation X.idm-dm, Identity Data ModelInitiated a liaison exchange with 3GPP SA 3 aimed at harmonization of the standards on media security
119SG 13 – Security work for next study period Security studies for the next study period will address:What new Recommendations or guidance to other Study Groups are needed to standardize identification of NGN threats and vulnerabilities?What are the security requirements of NGN to effectively counter these threats?What new Recommendations are necessary to enable comprehensive, end-to-end security in NGN that span across multiple heterogeneous administrative domains?What new Recommendations or guidance are necessary to enable attachment of terminals in a secure fashion, including Authentication, Authorization, and Accounting (AAA) considerations, to NGN?How to define security architecture of Identity Management in NGN?What are security requirements to Identity Management in NGN?What new Recommendations are needed for supporting security requirements of Identity Management in NGN?What new Recommendations are needed for supporting secure interoperability among different Circles of Trusts (CoT) in NGN?What new NGN Recommendations are needed for supporting security requirements of IPTV?
120Optical and Other Transport Network Infrastructures ITU-T SG 15ITU-T Study Group 15Optical and Other Transport Network Infrastructures
121SG 15 - ResponsibilitiesSG15 is responsible for the development of standards on optical and other transport network infrastructures, systems, equipment, optical fibres, and their management and the corresponding control plane technologies to enable the evolution toward intelligent transport networks. This encompasses the development of related standards for the customer premises, access, metropolitan and long haul sections of communication networks.This responsibility includes security-related aspects, including encryption, protection and restoration, and security management.
122SG 15 – Security related work in SG 15 QuestionTopic and security-related issues1/15Coordination of Access Network Transport standards Access Network Transport planning security aspects2/15Optical systems for fibre access networks Example: Link level encryption3/15General characteristics of optical transport networks OTN planning security aspects4/15Transceivers for customer access and in-premises networking systems on metallic conductors Example: Notching out frequency bands used by amateur radio etc.6/15Characteristics of optical systems for terrestrial transport networks Safety and reliability requirements9/15Transport equipment and network protection/restoration Security requirements for equipment functions and protection switching processes for transport networks10/15Optical fibres and cables for the access network to and in buildings and homes Safety and reliability requirements12/15Transport network architectures Architecture aspects, including security-related issues14/15Management and control of transport systems and equipment Security requirements for managing the transport network/system/equipment and the supporting management communication network and signalling communication network
123SG 15 – Major security accomplishments The common transport equipment management requirements Recommendation G.7710/Y.1701 (7/2007) has added M.3016 Series (2005) as normative reference for management plane security requirements.The requirements in G.7710/Y.1701, including the security requirements, continue to be the base for managing technology-specific transport equipment, including EoT in G.8051/Y.1345 (10/2007) and T-MPLS in G.8151/Y.1374 (10/2007).
124SG 15 – Security work for next study period Will continue to study security requirements for managing transport network/system/equipment and their control plane and revise the recommendations are necessaryG.806 (Generic Equipment Functions) will be revised and security requirements will be included.
125Multimedia terminals, systems and applications ITU-T SG 16ITU-T Study Group 16Multimedia terminals, systems and applications
126SG 16 – Q.25/16, Multimedia security in NGN Study Group 16 concentrates on multimedia systems.Q.25/16 focuses on the application-security issues of MM applications in existing and next generation networksStandardizes multimedia securitySo far Q.25/16 has been standardizing MM-security for the “1st generation MM/pre-NGN systems”:H.323/H.248-based systems126
128SG 16 – H.235 V4 sub-series Recommendations Major restructuring of H.235v3 Amd1 and annexes in stand-alone sub-series RecommendationsH.235.x sub-series specify scenario-specific MM-security procedures as H.235-profiles for H.323Some new parts addedSome enhancements and extensionsIncorporated correctionsApproved in September 2005128
129SG 16 – H.323 Security Recommendations (1) H “Security framework for H-series (H.323 and other H.245-based) multimedia systems”Overview of H.235.x sub-series and common procedures with baseline textH "Baseline Security Profile”Authentication & integrity for H signaling using shared secretsH "Signature Security Profile”Authentication & integrity for H signaling using X.509 digital certificates and signatures129
130SG 16 – H.323 Security Recommendations (2) H "Hybrid Security Profile"Authentication & integrity for H signaling using an optimized combination of X.509 digital certificates, signatures and shared secret key management; specification of an optional proxy-based security processorH "Direct and Selective Routed Call Security"Key management procedures in corporate and interdomain environments to obtain key material for securing H call signaling in GK direct-routed/selective routed scenariosenhancedextended130
131SG 16 – H.323 Security Recommendations (3) H "Framework for secure authentication in RAS using weak shared secrets"Secured password (using EKE/SPEKE approach) in combination with Diffie-Hellman key agreement for stronger authentication during H signalingH "Voice encryption profile with native H.235/H.245 key management"Key management and encryption mechanisms for RTPAmendment 1 (June 2008) added support for cipher key lengths of 192 and 256 bit to AESenhancedmodified131
132SG 16 – H.323 Security Recommendations (4) H "Usage of the MIKEY Key Management Protocol for the Secure Real Time Transport Protocol (SRTP) within H.235"Usage of the MIKEY key management for SRTPH "Key Exchange for SRTP using Secure Signalling Channels"SRTP keying parameter transport over secured signaling channels (IPsec, TLS, CMS)H "Security Gateway Support for H.323"Discovery of H.323 Security Gateways (SG = H.323 NAT/FW ALG) and key management for H signalingNEWNEW132
133SG 16 – Other MM-SEC results H (2003) “H Directory Services Architecture for H.235”An LDAP schema to represent H.235 elements (PWs, certificates, ID information)H.530 (2002) “Symmetric security procedures for H.323 mobility in H.510” + Cor.1 (2003)Authentication, access control and key management in mobile H.323-based corporate networksH (2007) “Security protocol negotiation” + Cor.1 (2008)Negotiate security protocols (IPsec or TLS or others) for H.323 signaling133
134SG 16 – Q.5/16 (H.300 NAT/FW traversal) results H (2005) “Traversal of H.323 signalling across FWs and NATs”H.323 protocol enhancements and new client/server proxies to allow H.323 signalling protocols traverse NATs & FWs; H.323 endpoints can remain unchangedH (2005) “NAT & FW traversal procedures for RTP in H.323 systems”Uses multiplexed RTP media mode and symmetric RTP in conjunction with H as a short-term solution134
135SG 16 – More Q.5/16 resultsTechnical Paper (2005) “Requirements for Network Address Translator and Firewall Traversal of H.323 Multimedia Systems”Documentation of scenarios and requirements for NAT & FW traversal in H.323Technical Paper (2005) “Firewall and NAT traversal Problems in H.323 Systems”An analysis of scenarios and various problems encountered by H.323 around NAT & FW traversalH-Series Supplement 10 (2008) “Proxy-aided NAT/FW Traversal Scheme for H.323 Multimedia Systems”Describe proxy-aided NAT/firewall traversal mechanism as a NAT traversal solution for H.323 multimedia systems135
136SG 16 – New security items under current study MM security aspects of Advanced Multimedia Systems (AMS) under Q.12/16Security consideration in the third generation MM system with a decomposed and distributed architectureSecurity aspects of IPTV system under Q.13/16Content protection related metadata136
137SG 16 – SummaryMultimedia systems and applications as being studied by SG16 face important security challenges:MM-security and NAT/FW traversalQ.25/16 and Q.5/16 are addressing these issues and have provided various RecommendationsThe work continues in the scope of NGN-Multimedia SecuritySecurity considerations are key part of draft new Question B7/16 “Advanced functions for H.300-series systems and beyond”Other Questions will also address the topic within their areas of competence137
138Mobile Telecommunication Networks ITU-T SG 19ITU-T Study Group 19Mobile Telecommunication Networks
139SG 19 – Scope of security work Scope: IMT-2000 Family Member NetworksBroad requirements for security are covered in the following ITU-T Recommendations:Q.1701 “Framework for IMT‑2000 networks”Q.1702 “Long-term vision of network aspects for systems beyond IMT-2000”Q.1703 “Service and network capabilities framework of network aspects for systems beyond IMT-2000”
140SG 19 – Strategic directions Mainly derived from Q.1702 and Q.1703Q.1702 indicates the following objectives to provide network security among heterogeneous inter-connected networks:Comprehensive, cross-provider security infrastructure supportWell-defined and conducted routine system risk analysisRobust system intrusion monitoring and response system to control damageLow overhead security protocols to accommodate wireless bandwidth limitationProvide seamless security across heterogeneous access technologies
141SG 19 – Strategic directions Mainly derived from Q.1702 and Q.1703Rec. Q.1703 specifies that at least the following security services should be provided:Integrity: contents as received are exactly as sentConfidentiality: user data is kept secret from unintended listenersNon-repudiation: prevent denying a transmission was initiatedMutual authentication: assurance that a participant is who he claims to beAuthorization: control user access to various network resources
142SG 19 – Security challenges To address security concerns arising due to:Migration from circuit switching to Packet switching (using IP in wireless networks)Fixed Mobile Convergence (FMC): access & services across heterogeneous networks (GSM, Wi‑Fi, PSTN, WiMAX, etc.) with the usage of IPTo define a security framework applicable across heterogeneous networks
143SG 19 – Major security accomplishments Q.1707/Y.2804 (02/2008) “Generic Framework of Mobility Management for NGNs”Designed to ensure that MM functions can interwork with the relevant authentication and security protocols.Q.1742-series “IMT‑2000 references to ANSI-41 evolved core network with cdma2000 access”References to 3GPP security specificationsS.S0078: Common Security AlgorithmsS.R0082: Enhanced Packet Data Air Interface SecurityS.R0083: Broadcast-Multicast Service Security FrameworkS.S0114: Security Mechanisms using GBAS.S0110: IP-Based Location Services Security FrameworkS.R0086: IMS Security Framework.
144SG 19 – Major security accomplishments (2) Q.1762/Y.2802 “Fixed-mobile convergence general requirements”Notes need for uniform authorization mechanismFMC may contain access-specific or -dependent parts but the procedure for handling these is uniformQ.1763 “FMC service using legacy PSTN or ISDN as the fixed access network for mobile network users”Authentication through a fixed network access provides for same security mechanism as in the mobile networkRefers to 3GPP TS / ETSI TS which address UMTS 3G security and security architecture
145SG 19 – Major security accomplishments (3) Working Draft Q.FMC-IMS “Fixed mobile convergence with a common IMS session control domain” as of 14 May 2008Mobile access in mobile networks faces an increased level of security threats compared to stationary access in fixed networksNomadic and wireless access in fixed networks utilize the mobile world security framework (TS ) for IMS access, with the IMS Subscriber Identity Module (ISIM) as a key componentReferences IMS security (3GPP TR ) and authentication mechanisms (ETSI TS )
146SG 19 – Security work for next study period F/19 : Convergence of existing and evolving IMT and fixed networksFMC cannot be studied in isolationHas to take into account the ongoing work on NGN scenarios, services, architecture, mobility, security and QoS, and on mobile network technologies outside of ITU-TStudy of specific FMC scenarios and solutions requires a solid understanding of mobile network technologies and close liaison with mobile network SDOs
147SG 19 – Specific actions member organizations of GSC should take Aim for globally consistent end-user security supportIdentify FMC security requirements for uniform authentication and authorization mechanisms (i.e., authentication and authorization combined)Network specific requirements for T-SPID
148Supplemental Information ITU-DTelecommunication Development Sector
149ITU-D Cybersecurity Activities: Two Main Pillars ITU-D Study Group 1 Question 22/1: Securing information and communication networks: Best practices for developing a culture of cybersecurityDeveloping a Framework for Organizing National Cybersecurity EffortsITU-D Programme 3 ITU Cybersecurity Work Programme to Assist Developing Countries. Example activities include:Assistance related to Establishment of National Strategies and Capabilities for Cybersecurity and Critical Information Infrastructure Protection (CIIP)Assistance related to Establishment of appropriate Cybercrime Legislation and Enforcement MechanismsAssistance related to establishment of Watch, Warning and Incident Response (WWIR) CapabilitiesAssistance related to Countering Spam and Related Threats, Establishment of an ITU Cybersecurity/CIIP Directory, Contact Database and Who’s Who PublicationCybersecurity IndicatorsFostering Regional Cooperation Activities
150Supplemental Information ITU-RRadiocommunication Sector
151ITU-R Cybersecurity Activities Radio spectrum global frequency management is increasingly important for building confidence and security and creating an enabling environment in the use of ICTs. ITU-R plays a central role in facilitating complex intergovernmental negotiations needed to develop legally binding agreements between sovereign states in an increasingly ‘unwired’ world.ITU-R activities related to cybersecurityRecommendation ITU-R M.1457 “Security mechanism incorporated in IMT-2000”Recommendation ITU-R S.1711 “Performance enhancements of transmissions control protocol over satellite”Recommendation ITU-R M.1645 “Framework and overall objectives of the future development of IMT-2000 and systems beyond IMT-2000”Recommendation ITU-R M.1223 “Evaluation of security mechanism for IMT-2000”ITU-RRecommendation ITU-R S.1250 “Network management architecture for digital satellite systems forming part of SDH transport networks in the fixed-satellite service”Recommendation ITU-R M.1078 “Security principles for IMT-2000”
152Some useful web resources ITU-T Home pageStudy Group 17LSG on SecuritySecurity RoadmapSecurity ManualCybersecurity PortalCybersecurity GatewayRecommendationsITU-T LighthouseITU-T Workshops