ATIS Liaison Pre-letter Ballot Review Security Management System (TMOC Issue 56) Chris Lonvick Joe Salowey Personal Liaisons to the TMOC Chair.

Slides:



Advertisements
Similar presentations
Oct 15 th, 2009 OGF 27, Infrastructure Area: Status of FVGA-WG Status of Firewall Virtualization for Grid Applications - Working Group
Advertisements

The Challenges of CORBA Security It is important to understand that [CORBAsecurity] is only a (powerful) security toolbox and not the solution to all security.
Page 1 of 14 To the Voltage Online Training Course Voltage encryption is used to protect sensitive and personal information sent via to external.
Executional Architecture
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Interoperability Principles in the Global Earth Observations System of Systems (GEOSS) Presented 13 March 2006 at eGY in Boulder, CO by: Eliot Christian,
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Socket Programming.
WNT Client/Server SDK Tony Vaccaro CS699 Project Presentation.
1 Introducing the Specifications of the MEF MEF 50: Carrier Ethernet Service Lifecycle Process Model.
Implementing Application Protocols. Overview An application protocol facilitates communication between applications. For example, an client uses.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Web-based Technology Web-based Project Management Application (WPMA) for Dredging Projects By GUSTAVO VECINO Civil Engineer February 2013.
OneM2M Draft proposal for slide set. This is not intended to be a oneM2M presentation. It is a collection of source material slides which can be used.
Application Layer. Applications A program or group of programs designed for end users. Software can be divided into two general classes: systems software.
Application Layer. Applications A program or group of programs designed for end users. A program or group of programs designed for end users. Software.
DOCUMENT #:GSC15-PLEN-46 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.9 CONTACT(S):Michael J. Fargano, Qwest,
Related work in other SDOs Silvana Rodrigues System Architect Phone:
Summary of 3GPP TR GPP2 TSG-S WG4 S Source: Qualcomm Incorporated Contact(s): Anand Palanigounder,
CRM WEB UI – ARCHITECTURE- DEFINITIONS For More details please go to
For more notes and topics visit:
January 2008 T. M. Kurihara, Chair, IEEE P1609Slide 1 doc: IEEE p Submission IEEE DSRC Application Services (P1609) Status Report.
UICC UICC is a smart card used in mobile terminals in GSM and UMTS networks It provides the authentication with the networks secure storage crypto algorithms.
Interoperability Tests for IEC Scott Neumann November 12, 2009.
Introduction To Computer System
22-23 June 2004TISPAN-3GPP Workshop - Sophia-Antipolis 1 Joint 3GPP & TISPAN Workshop on NGN-IMS - NGN-IMS issues handling - Alain Le Roux (France Telecom),
What is SharePoint? Module 1. Module Overview  Defining SharePoint  Understanding How SharePoint is Used  Interacting with SharePoint.
1 Goals and objectives (1 slide only) Project(s): MIB Ad hoc, involves EMS-NMS (MEF 7.1) Purpose of the contribution: Provide the rationale behind starting.
IEEE R lmap 23 Feb 2015.
World Class Standards WG8 presentation of current Subscription Management Activities TISPAN WG8 – 3GPP SA#5 Joint meeting Sophia Antipolis, May14th - 15.
OPTICALINTERNETWORKINGFORUM OIF Technical Committee and Its Activities Joe Berthold, Ciena, Technical Committee Chair.
James Williams e: eTutor Project SUMMARY OF KEY FINDINGS for 2 Pilot studies of the.
Object Management Group (OMG) Specifies open standards for every aspect of distributed computing Multiplatform Model Driven Architecture (MDA)
Operational Security Capabilities for IP Network Infrastructure
XML Registries Source: Java TM API for XML Registries Specification.
DateDecisionComments 09/11/2013 Form Design Professionals SubcommitteeChair Chris Zimmerman Administrative Lead: Elizabeth Susky 09/11/2013 Form Marketing.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
Leveraging UICC with Open Mobile API for Secure Applications and Services.
1 82 nd IETF meeting NETCONF over WebSocket ( ) Tomoyuki Iijima, (Hitachi) Hiroyasu Kimura,
HP Overview. HP Overview is a family of integrated network and system management solution for managing the complete IT enterprises, including networks,
© 2005 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
Lucy Yong Young Lee IETF CCAMP WG GMPLS Extension for Reservation and Time based Bandwidth Service.
Dec UtilityAMI OpenHAN TF Requirements Working Group Specification Briefing January 2008.
IFS310: Module 7 Business Requirements Statement Interpersonal Skills and Communications.
Framework & Requirements for an Access Node Control Mechanism in Broadband Multi-Service Networks IETF 66 - ANCP WG July 9-14, 2006 draft-ooghe-ancp-framework-00.txt.
The Process Manager in the ATLAS DAQ System G. Avolio, M. Dobson, G. Lehmann Miotto, M. Wiesmann (CERN)
Issues in Ontology-based Information integration By Zhan Cui, Dean Jones and Paul O’Brien.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Architecture View Models A model is a complete, simplified description of a system from a particular perspective or viewpoint. There is no single view.
Diameter Maintenance and Extensions (dime) IETF 68, March 2007, Prague David Frascone, Hannes Tschofenig.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
AFS/OSD Project R.Belloni, L.Giammarino, A.Maslennikov, G.Palumbo, H.Reuter, R.Toebbicke.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Proposed Presentation for 3GPP Date Submitted: September,
IEEE MEDIA INDEPENDENT HANDOVER DCN: hwnm Title: Thoughts on IEEE relation with IEEE Date Submitted: May 13, 2010.
ITU Liaison on T-MPLS Stewart Bryant
Architecture Review 10/11/2004
Online Training Course
Software Overview Sonja Vrcic
Workshop Discussion on Day-2
DOCUMENT SUBMITTED TO: TSSC and TC
Considering issues regarding handling token
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
Tiers vs. Layers.
Overview of ETS in IPCablecom Networks
3GPP and SIP-AAA requirements
Requirements Date: Authors: March 2010 Month Year
March Liaison Report Date: Authors: March 2010
Presentation transcript:

ATIS Liaison Pre-letter Ballot Review Security Management System (TMOC Issue 56) Chris Lonvick Joe Salowey Personal Liaisons to the TMOC Chair

Liaison Request from ATIS/TMOC ● From: TMOC - Telecom Management and Operations Committee, Formerly T1M1 OAM&P Committee, a committee of ATIS – Alliance for Telecommunications Industry Solutions. ● To: – TISPAN WG 8 – 3GPP2 TSG-S WG5 – IETF ● O&M Area Directors ● OpSec WG Chairs – ITU-T ● Rapporteurs ● SG4 Q18 Chair – DSL Forum – TR45 – OIF – MPLS Forum – MEF

Liaison Request from ATIS/TMOC ● The purpose of this correspondence is to inform you that the TMOC (Telecom Management and Operations Committee, Formerly T1M1 OAM&P Committee) has entered the pre Letter Ballot review phase for TMOC Issue 56, Security Management System Standard. This is a follow up notice to the TMOC correspondence entitled Announcement of New Standards Work: Security Management System (TMOC Issue 56), document number T1M1/ , transmitted on Aug 19, ● The latest baseline document is attached for your review. Comments would be greatly appreciated before March 24, Please send your comments directly to me.

The Liaison Statement ● TMOC-AIP r3 formerly T1M1.5/ R4 ● Received and is on the IETF/IAB Liaison Statement page: ●

Outline of the Document 1.SCOPE 2.REFERENCES 3.GLOSSARY 4.SECURITY MANAGEMENT SYSTEM CONCEPTS 5.TELCOM NETWORK ARCHITECTURE OVERVIEW 6.SECURITY MANAGEMENT SYSTEM FUNCTIONAL REQUIREMENTS 7.APPENDIX I SEMANTICS OF TERMS USED IN THIS DOCUMENT 8.APPENDIX II DETAIL RELATIONSHIP OF SECURITY MANAGEMENT CONCEPTS TO ISO

Already Noted ● References are outdated.

Points of Interest ● Section 4 - “The Security Management System described in this document is primarily a manager of security concepts intended to mechanize the application of various security and security management tools. Because it in essence supports these tools, it is considered an Operations Support System for Security Management. Thus the title Security Management Operational Support System (SM-OSS).”

Points of Interest ● Section Security Management Concepts Relationship to ISO ● Section Security Management Concepts Relationship to X.805 ● Section Security Management Concepts Relationship to T

Points of Interest ● Section 5 - “At the highest level of abstraction, a TSP's system infrastructure has four major functional areas:” ● Transport ● Application ● Management ● Application Environment – Operating Systems of management server (end) nodes, client (end) nodes and managed element nodes. – File systems of management server (end) nodes, client (end) nodes and managed element nodes. – The hardware components of management server (end) nodes, client (end) nodes and managed element nodes.

Points of Interest ● Section 5 – Requirements and Services are from M.3016.

Points of Interest ● Section 5 – Requirements SEC-1 through SEC-9 ● SEC-1: The TSP Infrastructure SHALL support capabilities to establish and verify the claimed identity of any subject interacting with, or within, the TSP Infrastructure. ● SEC-3: The TSP Infrastructure SHALL support the capability to keep stored and communicated data confidential. ● SEC-8: The TSP Infrastructure SHALL support the capability to analyze and exploit logged data on security relevant events in order to check for violations of system and network security.

Points of Interest ● Section 6 – Requirements SEC-11 through SEC-63 ● SEC-11: The interface SHALL use https (a secure web based interface) with XML and XSL. ● SEC-12: The user interface SHALL work with all of the popular web browsers. ● SEC-13: The user interface SHALL be able to execute all functions within the OSS application. ● SEC-14: There are no functions that must be performed via another method, such as a command line interface. An Architecture for Security Management T1M1.5/ ● SEC-15: This interface module SHALL communicate with the subsystems and other interface modules through the use of a non-proprie tary method, such as CORBA, DCE, Sockets/XML, etc.

Points of Interest ● Section 6 – Requirements SEC-11 through SEC-63 ● SEC-60: The interface module will communicate with the subsystems and other interface modules through the use of a non-proprietary method, such as CORBA, DCE, Sockets/XML, etc. ● SEC-61: The Interface Module SHALL setup the authentication request to the managed network element and authenticate itself prior to the execution of the commands. ● SEC-62: The OSS application SHALL have a supported API so that vendors of managed network elements may supply their own interface modules. ● SEC-63: The vendor of the OSS application SHALL provide an API so that managed network element vendors can produce an interface module for their product.

Liaison Response ● Please send your comments on the document to Joe and Chris. ● Please include notes on the following: – The document {SHOULD | SHOULD NOT} become an ANSI Standard, and your reasons for your conclusion. – Specific comments that can be given to TMOC to make the document better. ● Joe and Chris will consolidate the comments and give them to TMOC as a Liaison Contribution after review by the WG Chairs and Area Directors.