Security Activities in ETSI

Slides:



Advertisements
Similar presentations
Fostering worldwide interoperabilityGeneva, July 2009 Lawful Interception and Data Retention Presenter: Mike Sharpe, VP ETSI ESP Source: Peter van.
Advertisements

Fostering worldwide interoperabilityGeneva, July 2009 Overview of Security work in ETSI Presenter: Mike Sharpe, VP ETSI ESP Source: Charles Brookson,
Doc.: IEEE /0203r0 Submission January 2009 R. Roy (Connexis)Slide 1 ETSI TC ITS Liaison Report Date: Authors:
Geneva, Switzerland, September 2014 ETSI TC Cyber Charles Brookson Chairman ETSI TC Cyber Zeata Security Ltd and Azenby Ltd ITU.
ETSI Security activities Charles Brookson Chairman OCG Security Source: ETSI GTSC-1 Agenda item For: Information GSC
Security and LI; ETSI’s role in standards
DOCUMENT #:GSC15-CL-04 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Closing Plenary, 2.3 GTSC-8 Summary Report Duo Liu GTSC-8.
Jeju, 13 – 16 May 2013Standards for Shared ICT Cybersecurity Activities in ETSI Presenter: Adrian Scrase ETSI Chief Technical Officer (CTO) Document No:
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
Recommendations for transfer from TISPAN to 3GPP SP For information Source: Goran Engstrom: TISPAN WG1 chairman Stephen Hayes: 3GPP SA Chairman.
DOCUMENT #:GSC15-PLEN-58 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.1 CONTACT(S): Marylin Arndt, TC M2M chair M2M and Internet of Services "When the.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Security activities in ETSI Presenter: Mike Sharpe, ETSI VP ESP (ETSI Standardization Projects) Document.
Jeju, 13 – 16 May 2013Standards for Shared ICT TIA TR-50 M2M-Smart Device Communications Dr. Jeffery Smith Chief Innovation and Technology Officer/EVP.
Fostering worldwide interoperabilityGeneva, July 2009 Intelligent Transport Systems Presenter: Soeren Hess Chairman TC ITS Global Standards Collaboration.
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
International Telecommunication Union ETSI Security Standardization Dr. Carmine Rizzo CISA, CISM, CISSP, ITIL, PRINCE2 ITU-T Workshop on “New challenges.
Update on ETSI Security work Charles Brookson OCG Security Chairman DOCUMENT #:GSC13-PLEN-57 FOR:Information SOURCE:Charles Brookson AGENDA ITEM:6.3
Jeju, 13 – 16 May 2013Standards for Shared ICT IPTV & Content Delivery in ETSI Presenter: Chantal Bonardi ETSI Secretariat Technical Officer Document No:
Update on ETSI Cyber Security work Charles Brookson OCG Security Chairman Largely based on presentations given by Judith E. Y. Rossebø ETSI TISPAN WG7.
Jeju, 13 – 16 May 2013Standards for Shared ICT ETSI Conformance and Interoperability Testing Jørgen Friis ETSI Chief Services Officer (CSO) Document No:
ANSI – ESOs meeting Washington February 2017
New Generation of Digital Enhanced Cordless Telecommunications
Prime PSO: ATIS Presenter: Art Reilly
Report from Session #2: SDN/NFV
Consolidated M2M standards boost the industry
CCSA Cloud Computing Standardization Activities Summary
ETSI Emergency Communications
Bruno Chatras, ETSI TC TISPAN Vice-Chairman
GSC-15 Closing Plenary Summary Report
ETSI Standardization Activities on M2M communications
Technical Organization and approval procedures
ETSI Conformance and Interoperability Testing
High Intelligent Network (Smart Pipe)
Glenn Parsons, GTSC-9 Chair, ISACC
Presenter: Luis Jorge Romero oneM2M Steering Committee Chairman
ETSI Standardization Activities on M2M Communications
Update on Security and LI activities in ETSI
Security Activities in ETSI
Cybersecurity Presented by Charles Brookson OBE CEng FIET FRSA
NGN and Future Networks in ETSI
Global Standards Collaboration (GSC) 14 Security and Lawful Intercept
ETSI Activities related to Accessibility Issues
How your R&I projects can benefit from ETSI
ETSI role in Identity Management and Identification Systems
ETSI Standardization Activities on M2M Communications
Smart Grids activities in ETSI
Home Networking in ETSI
Presenter: Adrian Scrase ETSI Chief Technical Officer (CTO)
ITU Update since GSC-15 Bilel Jamoussi
CCSA Cloud Computing Standardization Activities Summary
GLOBAL ict standardisation forum for india (Gisfi)
Presenter: Adrian Scrase ETSI Chief Technical Officer (CTO)
Security and Lawful Intercept (LI)
Cybersecurity Activities in ETSI
Security and Lawful Intercept (LI)
Home Networking in ETSI
ETSI Standardization Activities on Smart Grids
PPSO (GRSC) Update: Standards Work on Lawful Interception
GSC-15 Closing Plenary Summary Report
TIA TR-50 M2M-Smart Device Communications
Report from Session #2: SDN/NFV
Reinhard Scholl, GTSC-7 Chairman
Presenter: Richard Brennan, Vice-Chair TC TISPSAN
ESO response to EU RFID Mandate M/436
ETSI Activities related to Accessibility Issues
ETSI Activities related to Accessibility Issues
IPTV & Content Delivery in ETSI
Glenn Parsons, GTSC-9 Chair, ISACC
GSC-15 Closing Plenary Summary Report
GSC-15 Closing Plenary Summary Report
Presentation transcript:

Security Activities in ETSI Document No: GSC17-PLEN-08 Source: ETSI Contact: Adrian Scrase Source: Gerald McQuaid Chairman TC LI, Charles Brookson Chairman OCG Security, Gabrielle Owen Chairman ERM GSC Session: PLEN, Agenda Item: 6.3 Security Activities in ETSI Presenter: Adrian Scrase ETSI Chief Technical Officer (CTO)

ETSI Security Activities RFID and NFC Intelligent Transport Systems Quantum Key Distribution (QKD) Identity and access management for Networks and Services (INS) Information Security Indicators (ISI) Algorithms In 3GPP – wireless security

Improving security of RFID ETSI has been a leading contributor in response to the EC Mandate on Privacy and Security of RFID. ETSI has undertaken two detailed practical tests to determine the risk of illicit reading and writing to the data content of RFID tags. ETSI is participating in the generation of reports and standards to improve the level of privacy and security for users of RFID. RFID chip manufacturers have responded to public concerns by improving the integrity of their designs.

Progress 1/4 3GPP: progress on LTE and IMS Various LTE security aspects IMS media plane security Intelligent Transport Systems, new specs on: Security Architecture and Security Management, Trust and Privacy Management, Access Control and Confidentiality Machine-to-Machine Release 2 to enhance the protection of security information Security aspects of EC mandates related to Smart Energy Activities expected to merge the oneM2M SDOs partnership

Progress 2/4 Lawful Interception / Data Retention Report on generic request/delivery interface (eWarrant) Progress on Dynamic Triggering and Cloud for LI/DR Electronic Signatures ETSI and CEN prepared rationalized framework, covering all types of AdES – new numbering for revised docs Smart Cards Specification for UICC fourth form factor Specs for Secure Channel between UICC and Terminal endpoint Future Networks New specs on LI and Operational Security Assurance Profile Future work from TC TISPAN to TC NTECH

Progress 3/4 Broadcast Two specs on Second Generation DVB Interactive Satellite System Identity and Access Management for Networks and Services (INS) Specs on architecture and on security and privacy requirements Information Security Indicators (ISI) Progress on first set of five specs: ISI indicators, event classification, maturity levels, how to produce security indicators and events

Progress 4/4 NFC and RFID security standards work ‘Privacy by Design’ initiative Cybersecurity work with other ESOs Cloud including security Security algorithms including new 3GPP and LTE authentication and privacy Information on these and other areas: Throughout the Annual 8th ETSI Security Workshop http://www.etsi.org/securityworkshop ETSI Security White Paper January 2013 with links to Standards (with 3GPP) www.etsi.org/securitywhitepaper

TC LI – Main items TC LI is the prime leader in maintaining LI and DR standards within the Global Standards Groups. Maintenance of LI and DR deliverables Preparation and publication of revised deliverables as agreed by TC LI#31 in Split (inclusion of new features/services, corrections, improvements) Progress on new deliverables TS on the Dynamic Triggering of Interception Two TRs on Lawful Interception and Data Retention in Cloud and virtual services

TC LI – Main items Started new specification to define a specific Warrantry electronic interface between two systems Under discussion Investigation into standardising the X1 provisioning interface underway.

Detailed work in progress TC LI continues to maintain the suite of Lawful Interception and Data Retention publications by updating them regularly. Work is on-going on a TS, expected to be published in 2013, providing a standardised mechanism for the dynamic triggering and revocation of the interception of communications content to take account of the increasingly dynamic configuration of CSPs and networks. This involves important security aspects, as the dynamic triggering functions need to be carried out with adequate levels of security to protect them from misuse or eavesdropping of the related commands. It is also essential that the triggering interface does not impact the underlying security of the network or services being intercepted.

Detailed work in progress TC LI continues its work on DR/LI for Cloud Computing with two TRs to provide recommendations on requests for handover and delivery of stored information associated with cloud/virtual services. The reports, expected to be published in 2013, are intended to identify any DR/LI work necessary to ensure that there are no technical obstacles in the converged cloud/virtual service environment to this aspect of regulation, thus ensuring, that RD/LI obligations can be maintained while allowing businesses to utilise the advantages and innovations of Cloud Services. This activity is closely aligned with SA3 LI’s reviews of the same subject.

TC LI – Liaison Activities Liaison Relationships Permanent active relationship with 3GPP/SA3-LI Active relationship started with ISO SC27, ISO SC38, and ITU-T SG13 (and it's JCA-cloud) Liaisons (at TC LI#32) Received from ITU-T SG13 JCA-cloud on cooperation Sent as reply to ITU-T SG13 JCA-cloud with information on TC LI work on Cloud 12