Presentation is loading. Please wait.

Presentation is loading. Please wait.

Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS Identity Management (IdM) Standards Development.

Similar presentations


Presentation on theme: "Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS Identity Management (IdM) Standards Development."— Presentation transcript:

1 Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS Identity Management (IdM) Standards Development Document No: GSC17-PLEN-59 Source: ATIS Contact: Andrew White, andrew.white@nsn.comandrew.white@nsn.com GSC Session: PLEN Agenda Item: 6.4

2 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Highlight of ATIS IdM Standards ATIS-1000035: Identity Management (IdM) Framework –Provides an IdM framework for Next Generation Network (NGN) –Describes the fundamental concepts, functional components and capabilities of IdM that can be used to organize and guide structured solutions and facilitate interoperability in an heterogeneous environment 2 ATIS’ Packet Technologies and Systems Committee (PTSC) completed the following IdM-related standards:

3 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea ATIS-1000044: Identity Management (IdM) Requirements and Use Cases Standard Provides IdM example use cases and requirements for the NGN and its interfaces. IdM functions and capabilities are used to increase confidence in identity information and support and enhance business and security applications including identity-based services. The requirements provided in this standard are intended for NGN (i.e., managed packet networks) as defined in ATIS-1000018, NGN Architecture, and ITU-T Recommendation Y.2001. 3 Highlight of ATIS IdM Standards

4 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea ATIS-1000045: Identity Management (IdM) Mechanisms and Procedures Standard Describes the specific IdM mechanisms and suites of options that should be used to meet the requirements in the IdM Requirement standard (ATIS-1000044). In addition, it provides best practices, guidelines to support interoperability and other needs. 4 Highlight of ATIS IdM Standards

5 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Strategic Direction Support the National Strategy for Trusted Identities in Cyberspace which addresses two central problems impeding economic growth online: –Passwords are inconvenient and insecure –Individuals are unable to prove their true identity online for significant transactions Leverage User-Centric solutions where possible, while identifying deltas to meet the needs of NGN providers –NGN service providers need to address both real-time and near-real time applications –Solution for real-time applications (e.g., exchange of IdM information for SIP communication sessions) would be distinct Provide structured and standard means to discover and exchange identity information across network domains/federations –Bridge different technology dependent systems including existing network infrastructure systems –Address new and emerging applications and services –Address unique security needs 5

6 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Challenges Identify theft, phishing scams, etc., are becoming more sophisticated, increasing the need for IdM education Un-trusted identity information as a result of migration to IP packet networks, emergence of new service providers (e.g., 3 rd party providers) and other changes (e.g., smart terminals, and an open internet environment) –Historically, trusted information was provided by closed and fixed network environment operating under regulatory conditions –Changes to the trust model are resulting in operations, accounting, settlements, security and infrastructure protection problems Overcoming “silo” solutions –User-centric model focusing on web services and electronic commerce –Available standards focus mainly on web services (e.g., OASIS, WS*, Liberty, SAML) and human identities –Vendor specific solutions/products (e.g., PayPal, iNames) –Impact of Kantara Initiative needs to be assessed 6

7 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Next Steps/Actions Continue to leverage User-Centric IdM solutions (e.g., OpenID and Oauth) –Avoid duplication and redundancy Leverage, use, enhance and adapt existing work and technology solutions where appropriate managed networks Enhance and customize existing IP/web services capabilities and work of other industry groups (e.g., Liberty Alliance, Kantara, OASIS, 3GPP, ITU-T) as appropriate –Allow for the use of existing (e.g., LIDB) and new resources and capabilities Collaborate with the White House initiative on National Strategy for Trusted Identities in Cyberspace (NSTIC) to improve the privacy, security, and convenience of sensitive online transactions 7

8 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Supplemental Slides 8

9 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Identity Management (IdM) Identity Management (IdM) involves secure management of the identity life cycle and the exchange of identity information (e.g., identifiers, attributes and assertions) based on applicable policy of entities such as: Users/groups Organizations/federations/enterprise/service providers Devices/network elements/systems Objects (Application Process, Content, Data) 9

10 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea ID Theft and Online Fraud: By the Numbers Identity theft is costly, inconvenient and all-too common –In 2010, 8.1 million U.S. adults were the victims of identity theft or fraud, with total costs of $37 billion. –The average out-of-pocket loss of identity theft in 2008 was $631 per incident. –Consumers reported spending an average of 59 hours recovering from a “new account” instance of ID theft. Phishing continues to rise, with attacks becoming more sophisticated –In 2008 and 2009, specific brands or entities were targeted by more than 286,000 phishing attacks, all attempting to replicate their site and harvest user credentials. –A 2009 report from Trusteer found that 45% of targets divulge their personal information when redirected to a phishing site, and that financial institutions are subjected to an average of 16 phishing attacks per week, costing them between $2.4 and $9.4 million in losses each year. Managing multiple passwords is expensive –A small business of 500 employees spends approximately $110,000 per year on password management. That’s $220 per user per year. Passwords are failing –In December 2009, the Rockyou password breach revealed the vulnerability of passwords. Nearly 50% of users’ passwords included names, slang words, dictionary words or were extremely weak, with passwords like “123456”. Maintenance of multiple accounts is increasing as more services move online –One federal agency with 44,000 users discovered over 700,000 user accounts, with the average user having individual accounts. Improving identity practices makes a difference –Implementation of strong credentials across the Department of Defense resulted in a 46% reduction in intrusions. –Use of single sign-on technologies can reduce annual sign-in time by 50 hours/user/year. 10

11 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Value Added for NGN Provider Dynamic/automatic IdM means between multiple partners (e.g., end users, visited and home networks) reduce costs (compared to pair-wise arrangements) compared to pair-wise arrangements to –Establish service arrangements –Exchange identity information –Exchange policy information and enforce policy Enabler of new applications and services (e.g., IPTV and convergence) including identity services Leverage existing and expanding customer base Common IdM infrastructure enables support of multiple applications and services Enables –standard API and data schema for application design –multi-vendor/platforms solutions –inter-network/federations interoperability –Security protection of application services, network infrastructure and resources 11

12 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Value Added for the User Privacy/user control –Protection of Personal Identifiable Information [PPII] –Ability to control who is allowed access (i.e., providing consent) to personal information and how it is used Ease of use and single sign-on / sign-off (multiple application/services across multiple service providers/federations) Enabler of Social Networking Security (e.g., confidence of transactions, and Identity (ID) Theft protection) 12

13 GSC17-PLEN-59 Standards for Shared ICT GSC-17, Jeju / Korea Government Motivations Infrastructure Protection (i.e., against cyber threats) Protection of Global Interests (e.g., business and commerce) Provide assurance capabilities (e.g., trusted assertions about digital identities [credentials, identifiers, attributes and reputations]) to enable National Security/Emergency Preparedness (NS/EP) Early Warning Services Electronic Government (eGovernment) Services (e.g., web-based transactions) Public Safety Services (e.g., Emergency 911 services) Law Enforcement Services (e.g., Lawful Interceptions) National/Homeland Security Intelligence Services 13

14 ATIS PTSC IdM Documents DocumentScopeIssue DescriptionTarget Date ATIS NGN IdM Framework Standard [PTSC Issue S0058] Framework for NGN IdM  Framework for handling identities in a secured and authenticated manner in a multi-network, multiple service provider environment Published as ATIS- 1000035.2009 ATIS IdM Requirements and Use Cases [PTSC Issue S0059] IdM Use Case examples for NGN  Develop Use Cases illustrating IdM applications in a multi-network, multiple service provider environment defined by the ATIS NGN architecture  Requirements for handling identities in a secured and authenticated manner in a multi-network, multiple service provider environment  Harmonized approach to address IdM issues in the ATIS NGN architecture Published as ATIS- 1000044.2011 ATIS IdM Mechanisms Standard [PTSC Issue S0060] NGN IdM Mechanisms and Procedures  Develop IdM mechanisms (e.g., registration, authorization, authentication, attribute sharing, discovery) to be used in a harmonized approach for the ATIS NGN architecture Published as ATIS- 1000045.2012 14 Note: parallel documents exist in ITU-T SG13, Q15 Standards for Shared ICT GSC-17, Jeju/Korea


Download ppt "Jeju, 13 – 16 May 2013Standards for Shared ICT Andrew White Principal Consultant Nokia Siemens Networks ATIS Identity Management (IdM) Standards Development."

Similar presentations


Ads by Google