Fostering worldwide interoperabilityGeneva, 13-16 July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.

Slides:



Advertisements
Similar presentations
International Telecommunication Union An Insight into BDT Programme 3 Marco Obiso ICT Applications and Cybersecurity Division Telecommunication Development.
Advertisements

ELTSS Alignment to Nationwide Interoperability Roadmap DRAFT: For Stakeholder Consideration in response to public comment.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All Recent Standardization Activities on Cloud Computing Kishik Park, Kangchan Lee, Seungyun Lee TTA.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All The Internet of Things (IoT) aka Machine 2 Machine (M2M) Bilel Jamoussi Chief, Study Groups Department.
International Telecommunication Union An Emerging Global Convergence on Identity Management Tony Rutkowski mailto: Vice President,
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All ITU-T Identity Management Update Bilel Jamoussi, Chief, SGD/TSB ITU Abbie Barbir, Q10/17 Rapporteur.
DOCUMENT #:GSC15-PLEN-37 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:Plenary 6.6 Networked Vehicle Chaesub Lee and Yushi.
Geneva, Switzerland, 4 December 2014 ITU-T Study Group 17 activities in the context of digital financial services and inclusion: Security and Identity.
DOCUMENT #:GSC15-PLEN-47r1 FOR:Presentation or Information SOURCE:CCSA AGENDA ITEM:6.9 CCSA Standardization activities on.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Arkadiy Kremer Chairman ITU-T Study Group 17 Session 2: Role of Standardization in Cybersecurity.
DOCUMENT #:GSC15-PLEN-46 FOR:Presentation SOURCE:ATIS AGENDA ITEM:PLEN 6.9 CONTACT(S):Michael J. Fargano, Qwest,
DOCUMENT #:GSC15-PLEN-08 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (4.5) CONTACT(S):Jim MacFie ISACC Activities Since GSC-14 Jim MacFie.
DOCUMENT #:GSC15-GTSC-05 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:4.1 NGN, Testing specification and Beyond Chaesub.
SCC Activities C. Tilton. Standards Are applied to SOMETHING Within some CONTEXT Something = ID Ecosystem Context = Use Cases 2.
DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
DOCUMENT #:GSC15-PLEN-29 FOR:Presentation or Information SOURCE:ITU-T AGENDA ITEM:6.4 Identity Management Jianyong.
DOCUMENT #:GSC15-PLEN-48 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.10 CONTACT(S): James McEachern
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
DOCUMENT #:GSC15-PLEN-26 FOR:Presentation SOURCE: ATIS AGENDA ITEM: PLEN 6.4 CONTACT(S): James McEachern ATIS Identity Management.
DOCUMENT #:GSC15-CL-04 FOR:Presentation SOURCE:CCSA AGENDA ITEM:Closing Plenary, 2.3 GTSC-8 Summary Report Duo Liu GTSC-8.
TTA activity for countering BOTNET attack and tracing cyber attacks 14 July, 2008 Heung-youl Youm TTA, Korea DOCUMENT #:GSC13-GTSC6-07 FOR:Presentation.
Fostering worldwide interoperabilityGeneva, July 2009 How to counter web-based attacks on the Internet in Korea Heung Youl YOUM Chairman of Korea.
A National approach to Cyber security/CIIP: Raising awareness.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
1 Emergency Management Standards EM- XML Consortium & EM Technical Committee Presentation to Steve Cooper March 18,2003.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All SMART GRID ICT: SECURITY, INTEROPERABILITY & NEXT STEPS John O’Neill, Senior Project Manager CSA.
International Telecommunication Union Eighth Global Standards Collaboration (GSC) Meeting - Ottawa, Canada, 27 April-1 May 2003 Security Standardization.
DOCUMENT #:GSC15-PLEN-51 FOR:Presentation SOURCE:ITU AGENDA ITEM:Plenary 6.10 Conformance and Interoperability Testing.
ITU Regional Standardization Forum for Americas (Washington D.C., United States, 21 September 2015) Conformance and Interoperability Activities in CITEL.
Fostering worldwide interoperabilityGeneva, July 2009 Standardization activities on Home Networking in CCSA Duo LIU, Deputy Secretary General of.
ITU Overview Empowering global ICT development Malcolm Johnson DOCUMENT #:GSC13-XXXX-nn FOR:Presentation SOURCE:ITU AGENDA ITEM:Opening Plenary, 4.6 CONTACT(S):Malcolm.
Progress on Identity Management: A Canadian Perspective on GSC Resolution 14/4 Colman Ho ISACC DOCUMENT #:GSC15-PLEN-28 FOR:Presentation SOURCE:ISACC AGENDA.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BUSINESS USE OF TELECOMUNICATION SECURITY STANDARDS PROJECT Patrick Mwesigwa, Director/Technology.
DOCUMENT #:GSC15-PLEN-82r2 FOR:Presentation SOURCE:ATIS AGENDA ITEM: PLEN 6.14 CONTACT(S): Andrew White ATIS’
Fostering worldwide interoperabilityGeneva, July 2009 Intelligent Transport Systems Presenter: Soeren Hess Chairman TC ITS Global Standards Collaboration.
Fostering worldwide interoperabilityGeneva, July 2009 IdM and Identification Systems Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration.
International Telecommunication Union Accra, Ghana, June 2009 Telecommunication Security Standardization in ITU-T SG 17 Georges Sebek, ITU/TSB ITU.
Fostering worldwide interoperabilityGeneva, July 2009 The Home Network: Where Convergence Takes Hold Tim Jeffries, VP Technology and Business Development,
ITU Strategic Planning ICE Proposal January, 2014.
Jeju Island, Korea, 13 – 16 May 2013Identity Management and Identification Systems GSC17-PLEN-43 ITU-T IDENTITY MANAGEMENT UPDATE Bilel Jamoussi, Chief,
Fostering worldwide interoperabilityGeneva, July 2009 Support convergences over NGN Chaesub LEE, ITU-T SG13 Chairman, followed by Global Standards.
SDO/Forum Collaboration: An Essential Part of ICT Management Dave Sidor Chairman, ITU-T SG 4 Nobuo Fujii Vice Chairman, ITU-T SG 4 DOCUMENT #:GSC13-PLEN-10.
Fostering worldwide interoperabilityGeneva, July 2009 ATIS Identity Management Standards Development James McEachern, Manager – Application Enabler.
Jeju, 13 – 16 May 2013Standards for Shared ICT Update of ARIB Activities on IMT Standardization Yoshihide ISHIDA Director, Land Mobile Communications Group,
DOCUMENT #:GSC15-PLEN-79 FOR:Presentation SOURCE:TTC AGENDA ITEM: GSC Plenary 6.10 GTSC 4.1 NGN interoperability -
Issues need harmonization
WTSA-12 Resolutions addressing security
Global Standards Collaboration (GSC) 14
WTSA-12 Resolutions addressing security
Global Standards Collaboration (GSC) GSC-15
Glenn Parsons, GTSC-9 Chair, ISACC
Global Collaboration on Future Network Standardization
ATIS Interoperability
Global Collaboration on Future Network Standardization
Global Collaboration on Future Network Standardization
ATIS’ Service Oriented Networks (SON) Activity
ITU-T Study Group 17 Security
Recent Standardization Activities on NID
Update of ARIB Activities on IMT Standardization
Reinhard Scholl, GTSC-7 Chairman
Malcolm Johnson, Director, Telecommunication Standardization Bureau
ITU-T activity in ICT security
Glenn Parsons, GTSC-9 Chair, ISACC
Recent Standardization Activities on Cloud Computing
Wayne Zeuch, GTSC-6 Chair Nicole Butler, ATIS Staff
Conformance and Interoperability Activities in CITEL PCC.I
Presentation transcript:

Fostering worldwide interoperabilityGeneva, July 2009 ITU-T Telecom Security Update Arkadiy Kremer ITU-T SG 17 Chairman Global Standards Collaboration (GSC) 14 DOCUMENT #:GSC14-GSC7-03 FOR:Presentation SOURCE:ITU-T AGENDA ITEM:GTSC 4.2

Fostering worldwide interoperability Telecom Security is an Essential Part of IP-based Networks and Services Integration of telecommunication and security infrastructures is constantly increasing Convergence of services where voice, data/video and broadcasting are appearing on all types of network platforms Internet is a part of telecommunication infrastructure Next-generation business model for network operators demands subscriber-centric data consolidation 2

Fostering worldwide interoperability Highlight of Current Activities Terms and definitions alignment across members of GSC Security Compendium includes catalogs of approved security-related Recommendations and security definitions extracted from approved Recommendations Security Standards Roadmap includes searchable database of approved ICT security standards from ITU-T and others (e.g., ISO/IEC, IETF, ETSI, IEEE, ATIS) JCA-IdM (was discussed on PLEN 6.4) JCA-CIT - a standard is the real standard if it is verified (more in supplementary slides) Business Use of Security Standards - a standard is the real standard if it has the business-applications. ITU-T together with the GSC members would like to provide a report which will consist of summary sheets for analysed top security standards (status and summary  who does the standard affect?  business benefits  technologies involved  technical implications) (more in supplementary slides) 3

Fostering worldwide interoperability 44 Geneva, July 2009 Providing a Global Cybersecurity Information Exchange Framework – X.cybief (more in supplementary slides) Responsive to GSC-13/11, resolves 5: promote global, consistent, and interoperable processes for sharing incident-response related information Large-scale effort to bring “best of breed” of security information exchange standards into the ITU and facilitating global interoperability and trust for security state, vulnerabilities, incidents, threats Facilitated by a global security exchange identification scheme for organizations, information identifiers, and policies use of Extended Validation Certificates based on X.509 Providing for close working relationship with principal CIRT/CERT organization (FIRST) and a ssisting developing countries to establish CIRTs on a national basis (WTSA Res. 58) Highlight of Current Activities

Fostering worldwide interoperability 55 Geneva, July 2009 Work on telecom security standardization convergence points gaps: Security architecture  SOA security Network security  business infrastructure security ICT security  information critical infrastructure security Personal data protection  IdM Security management  security collaboration Security collaboration No one organization can provide its own security without interaction with others Security collaboration contains measures, which pertain to the readiness and ability of the organizations to interact with other entities (including operators, users and law enforcement authorities) to counter the threats Need a framework for raising the understanding of what is achievable Strategic Directions

Fostering worldwide interoperability 66 Geneva, July 2009 Strategic Directions Essential to pessimistically evaluate threats in light of the success we expect Three great classes of threats: Insider attacks Social engineering Organized crime’s monetization of malware and fragility Connecting systems is good. Sharing vulnerability is bad. Systems must fundamentally distrust the systems with which they interact Minimal disclosure technology is fundamental in a federated world. “Need to know” Internet

Fostering worldwide interoperability 77 Geneva, July 2009 Keeping ahead of security needs vulnerabilities incidents Getting isolated security communities to cooperate effectively Implementing needed identity management platforms and trust models in the infrastructure widespread deployment of "Extended validation certificates" for organization/provider trust that accommodate the diversity of parties and assurance levels/requirements Making security “measurable” Challenges

Fostering worldwide interoperability 88 Geneva, July 2009 Proceed with the development and adoption of the Global Cybersecurity Information Exchange Framework Adopt X.evcert – an Extended Validation Certificate Framework Get an OID identifier arc assigned for identifying organizations, information, and policies Work with existing and emerging new security organizations to facilitate development and use of a common exchange framework Next Steps/Actions

Fostering worldwide interoperability 9 Proposed Modification Resolution on Cybersecurity Modify the Cybersecurity resolution “recognizing” section by adding a new paragraph: Achieving most of the above requirements is highly dependent on a global framework for the trusted structured exchange of information concerning the cybersecurity state of devices/systems, vulnerabilities, incidents, and heuristics among the operators, vendors, security organizations and agencies Modify the Cybersecurity resolution resolves 5 section by changing to promote trusted global, structured, interoperable, and measurable processes for sharing cybersecurity state, vulnerability, and incident-response related information through a global framework 9 Geneva, July 2009

Fostering worldwide interoperability 10 Geneva, July 2009 Supplementary Slides

Fostering worldwide interoperability 11 JCA-CIT A standard is the real standard if it is verified The main objectives of the JCA-CIT are to coordinate: The collection of and making available information about testing activities and testing methodologies Provision of feedback on collected information as appropriate Development of a common understanding of Conformance vs. Interoperability testing Development of the requirements placed on writing Recommendations to accommodate testing Provision of technical assistance to Rapporteurs and editors writing Recommendations for testing and test specification Provision of input towards the evolution of Recommendations that define testing methodology Dissemination of information about testing across other SDOs Preparation of material for tutorials, workshops, conferences and make presentation if appropriate Promotion of the use of a common terminology and methodology of testing Finding working methods to co-ordinate activities and improve sharing of results

Fostering worldwide interoperability 12 Business Use of Security Standards A standard is the real standard if it has the business-applications. ITU-T together with the GSC members would like to provide a report which will consist of summary sheets for analysed top security standards (status and summary  who does the standard affect?  business benefits  technologies involved  technical implications) Your comments and views on the following would be appreciated: Do you agree that this work activity would be useful to organizations and/or DC/CETs planning to deploy telecommunications/ICT security systems? Does your organization have existing information that may be related to this work activity or that may be used to progress this work? Does your organization have contact with DC/CETs that may further elaborate on their needs and detail the information they may find most useful to capture in the activity output? Does your organization have any suggestions to provide additional detail regarding the proposed summary sheet elements or criteria to select standards? Would your organization be willing to assist the ITU-T in progressing this work?

Fostering worldwide interoperability 13 Purposes Enable global capabilities for the structured exchange of cybersecurity information by identifying and incorporating existing “best of breed” platform standards as necessary, making the existing standards more global and interoperable Move beyond guidelines and facilitate the scaling and broad implementation of core capabilities already developed within cybersecurity communities Global Cybersecurity Information Exchange Framework

Fostering worldwide interoperability 14 Cybersecurity information: structured information or knowledge concerning 1.The “state” of equipment, software or network based systems as related to cybersecurity, especially vulnerabilities 2.Forensics related to incidents or events 3.Heuristics and signatures gained from experienced events 4.Parties who implement cybersecurity information exchange capabilities within the scope of this framework 5.Specifications for the exchange of cybersecurity information, including modules, schemas, and assigned numbers 6.The identities and trust attributes of all of the above 7.Implementation requirements, guidelines and practices Global Cybersecurity Information Exchange Framework

Fostering worldwide interoperability 15 Global Cybersecurity Information Exchange Framework Cybersecurity Information acquisition (out of scope*) Cybersecurity Information use (out of scope*)  Structured information  Identification & discovery of cybersecurity information and entities  Trusted exchange Cybersecurity Entities Cybersecurity Entities *Some specialized cybersecurity exchange implementations may require application specific frameworks specifying acquisition and use capabilities

Fostering worldwide interoperability 16 Global Cybersecurity Information Exchange Framework – Capabilities and Context The Framework enables exchange capabilities for the entire Cyber Security Ecosystem, by providing for the dashed information exchanges

Fostering worldwide interoperability 17 Framework Capabilities Outline Cybersecurity structured information Identify existing standards Bring some of them into ITU-T as X-series standards and supplement as needed for global interoperability Cybersecurity identification and discovery Identify existing standards Bring some of them into ITU-T as X-series standards and supplement as needed for global interoperability Cybersecurity trusted acquisition and exchange Identify existing standards Bring some of them into ITU-T as X-series standards and supplement as needed for interoperability