Addressing security challenges on a global scale

Slides:



Advertisements
Similar presentations
Russ Housley IETF Chair LACNOG 4 October 2011 Successful Internet Protocol Development.
Advertisements

ICANN Plan for Enhancing Internet Security, Stability and Resiliency.
Tips and Resources IASC Cluster/Sector Leadership Training
Supporting National e-Health Roadmaps WHO-ITU-WB joint effort WSIS C7 e-Health Facilitation Meeting 13 th May 2010 Hani Eskandar ICT Applications, ITU.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
State Health Departments: Focused on the Next Level Ann Robbins Texas Department of State Health Services National Alliance of State and Territorial AIDS.
Russ Housley IETF Chair 23 July 2012 Introduction to the IETF Standards Process.
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
S.1 Using a Global Validation Service to Unite Communities Jon Shamah EMEA Head of Sales, BBS eSecurity.
E-Government Policies, Strategies and Implementation Jamal Shahin Institute for European Studies, Vrije Universiteit Brussel 15:00 – 15:20, 21 December.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
The Resource Public Key Infrastructure Geoff Huston APNIC.
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
Distributed Systems. Outline  Services: DNSSEC  Architecture Models: Grid  Network Protocols: IPv6  Design Issues: Security  The Future: World Community.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Interoperability Updates -National Interoperability Roadmap 8/20/2014 Erica Galvez, ONC Interoperability Portfolio Manager.
State Alliance for e-Health Conference Meeting January 26, 2007.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
A Brief Overview of draft-ietf-sidr-cp-01.txt draft-ietf-sidr-cps-rirs-01.txt draft-ietf-sidr-cps-isp-00.txt Steve Kent BBN Technologies.
June 6, CRISP Overview and Update Andrew Newton VeriSign Labs
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Best Current Operational Practices – Efforts from the Internet Society Deploy360 – Internet Society.
Jeju, 13 – 16 May 2013Standards for Shared ICT TIA TR-50 M2M-Smart Device Communications Dr. Jeffery Smith Chief Innovation and Technology Officer/EVP.
Smart Objects and the Internet Architecture Fred Baker.
Authorization GGF-6 Grid Authorization Concepts Proposed work item of Authorization WG Chicago, IL - Oct 15 th 2002 Leon Gommans Advanced Internet.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
Security Area Advisory Group Tim Polk Sean Turner July 29, 2010.
Rural Ohio Technology Infrastructure Group All Transportation Counts Conference October 8, 2003.
© 2015 Open Grid Forum ETSI CSC activities Wolfgang Ziegler Area Director Applications, OGF Fraunhofer Institute SCAI Open Grid Forum 44, May 21-22, 2015.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Internet Of Things (IoT)
Analysis of secured VoIP services
Regulation of Medical Devices: Importance of a Globally Harmonized Approach Nicole Taylor Smith, JD September 2017.
Challenges for the 12th Plenary
The ITU-T X.500 series and X.509 in a changing world
Consolidated M2M standards boost the industry
Dr. Konstantinos Komaitis
Living in a Network Centric World
Living in a Network Centric World
ONAP and the Internet Engineering Task Force
Shaping smarter and more sustainable cities from WSIS to Habitat III
DANE: The Future of Transport Layer Security (TLS)
10CS835 Information Security
Cognitus: A Science Case for HPC in the Nordic Region
Presented by Fabio Bigi Workshop Coordinator
CompTIA Security+ Study Guide (SY0-401)
Why the Multistakeholder Approach Works
Server-to-Client Remote Access and DirectAccess
Living in a Network Centric World
Living in a Network Centric World
Security & .NET 12/1/2018.
IEEE IETF Liaison Report
Living in a Network Centric World
Tim Bornholtz Director of Technology Services
Chandler and Higher Education
Review Exam 2.
Living in a Network Centric World
Group Meeting Ming Hong Tsai Date :
Living in a Network Centric World
Making Our Cities Smarter and More Sustainable
IEEE IETF Liaison Report
Living in a Network Centric World
TIA TR-50 M2M-Smart Device Communications
Living in a Network Centric World
IEEE IETF Liaison Report
Reinhard Scholl, GTSC-7 Chairman
APNIC’s Engagement on Security
Living in a Network Centric World
IEEE IETF Liaison Report
Living in a Network Centric World
Presentation transcript:

Addressing security challenges on a global scale IETF Security Activities and Collaboration Tim Polk National Institute of Standards and Technology tim.polk@nist.gov Geneva, 6-7 December 2010 Addressing security challenges on a global scale

Two Excerpts from IETF Mission Statement The mission of the IETF is to make the Internet work better … by producing high quality, relevant technical documents that influence the way people design, use, and manage the Internet. One of the Cardinal Rules is Protocol Ownership When the IETF takes ownership of a protocol or function, it accepts the responsibility for all aspects of the protocol .... Geneva, 6-7 December 2010 Addressing security challenges on a global scale

Responsibilities of IETF Security Area Security-centric standards development IETF Security Area includes between ten and eighteen working groups devoted to a particular mechanism or technology Contributing “security-clue” to standards developed in other IETF areas Recruiting security participants to contribute to other IETF standards areas, and monitoring those efforts to ensure we are actually helpful Cross-SDO collaboration Providing Internet specific details (X.509) Supporting Security requirements from other SDOs (mikey modes for W3C) Geneva, 6-7 December 2010 Addressing security challenges on a global scale

Security-Centric Standards Development These standards are intended as essential building blocks Key Management Infrastructures Kerberos, X.509, multicast security, hokey, new DNSSEC based key distribution work Secure Transport Transport Layer Security (TLS and DTLS), Secure Shell Secure Applications S/MIME, DKIM, NEA, sasl Authentication Technologies EAP methods, federated authentication Most exciting new work is leveraging DNSSEC to securely distribute key material Geneva, 6-7 December 2010 Addressing security challenges on a global scale

Collaborative Initiatives Many IETF activities are inherently tied to technologies developed outside the security area, but security clue is essential to success Worked examples include DNSSEC (Internet area) and TCP-AO (Transport area) Understanding DNS and the TCP state machine were critical aspects Current activities are focused in the Routing area and include secure inter-domain routing (sidr) and key management for routing protocols (karp) Routing protocols demand a very specific background Cross-SDO activities include X.509 and the XML Digital Signature Standard Geneva, 6-7 December 2010 Addressing security challenges on a global scale

High-Priority Opportunities Ongoing/Emerging IETF activities Leveraging DNSSEC for secure key or certificate distribution Securing routing protocols Security for the “Internet of Things” Privacy-enhancing technologies Other Opportunities Security Automation Application of current protocols to emerging sectors Health care, smart grid, etc. Geneva, 6-7 December 2010 Addressing security challenges on a global scale

Personal Observations on Collaboration Collaborations starts with Sound Architecture and Engineering Decisions Good protocols lend themselves to use as building blocks Well engineered protocols are extensible to solve other problems If a protocol needs major surgery to satisfy a new effort, it may be the wrong protocol Collaboration within the IETF and between SDOs is fundamentally the same problem Success demands that committed individuals regularly participate in the activities of both IETF working groups (or both SDOs) Geneva, 6-7 December 2010 Addressing security challenges on a global scale