Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security WG: Report of the Spring 2004 Meeting May 13, 2004 Howard Weiss, NASA/JPL/SPARTA.

Similar presentations


Presentation on theme: "Security WG: Report of the Spring 2004 Meeting May 13, 2004 Howard Weiss, NASA/JPL/SPARTA."— Presentation transcript:

1 Security WG: Report of the Spring 2004 Meeting May 13, 2004 Howard Weiss, NASA/JPL/SPARTA

2 Meeting Agenda  Wed, 12 May 2004  0900-0915: Welcome, opening remarks, logistics, agenda bashing  0915:0930: Review results of Fall 2003 SecWG meeting (SEA- SEC_Report)SEA- SEC_Report  0930-1200: Security Architecture Document Discussions  1200-1300: lunch break  1300-1600: Threat Document Discussions  Thurs, 13 May 2004  0900-1000: Revised Green Book discussions  1000-1200: New business Mandatory security section in CCSDS documents Crypto standard Integrity Standard Authentication Standard Key Management Future Documents

3 Executive Summary  Attendees from ASI (2), CNES, BNSC, NASA/GSFC (via telecon), DLR, NASA/JPL  Discussed the SecWG documents in process:  Security Architecture  Threat  Revised Green Book  Discussed and re-wrote the “mandatory security section” for CCSDS documents  Discussed and have proposals for CCSDS standards for:  Encryption  Authentication/integrity  Have agreed to think more about key management alternatives

4 Summary of Goals and Deliverables 1. Complete update/revision of the Security Green Book. 2. Complete update/revision of Security Architecture. 3. Complete update/revision of Threat Document. 4. Propose a CCSDS encryption standard. 5. Propose a CCSDS authentication standard. 6. Think about proposals for a CCSDS key management standard. 7. Work with other WGs with respect to security.

5 Progress Achieved  Agreed that we did not need a common set of “mission classes” for all SecWG documents:  High level set of mission classes for architecture  More detailed (lower level) set of mission classes for threat  Re-wrote the “mandatory security” statement.  Agree to propose low level security standards:  Encryption AES-128  Authentication/Integrity Digital Signature Standard  Agreed to further study key management  Key updating  Identity-based encryption (IBE)

6 Re-worded Mandatory Security Statement  Propose to include a security section template for all CCSDS documents with headings and explanatory text to help authors fill in the blanks.  Outline of security section:  Provide rationale and explanation as to why or why not security plays a role in this CCSDS document.  Template headings: 1.0 Security Background/Introduction 2.0 Statements of security concerns with respect to the CCSDS document:  data privacy  data integrity  authentication of communicating entities  control of access to resources  availability of resources  auditing of resource usage 3.0 Potential threats and attack scenarios (how could someone break the technology and why) 4.0 Consequences of not applying security to the technology (e.g., loss of life, loss of mission).

7 Near-Term Schedule DeliverableMilestoneDate Green Book revisions Comments received from WG Publish a revised book for CCSDS approval 06/04 CCSDS Security Architecture (2nd Draft) Publish a draft document (White Book) Red Book-1 Red Book-2 Blue Book-1 06/04 10/04 04/05 10/05 Revise Security Threat Statement with revised “mission classes” Revise with new mission classes 06/04

8 Schedule (cont) Encryption ProposalWrite up proposal for CCSDS encryption standard based on AES-128 07/04 Authentication/Integrity Proposal Write up proposal for CCSDS authentication/inte grity standard based on the Digital Signature Standard 08/04

9 Open Issues  Key management proposal  Policy framework  E.g., NIST document could be leveraged but will take resources to adapt for CCSDS. Resources not available at present.  Ground systems  Security for the ground system  Interconnection/policy for cross support across ground systems  Future documents – resources to tackle them  Common Criteria Protection Profiles  Security Handbook for Mission Planners

10 Action Items  Update Security Architecture based on WG comments (Kenny)  Update mission classes  “Ratify” Security Architecture via vetting by other working groups (e.g., SOIS, CSS, SLS) (Weiss/Kenny)  Investigate national encryption export/import rules and regulations (Pechmalbec, all)  Prepare key management alternatives proposal paper (Kenny)  Public key techniques  Identity-based techniques  Key update techniques  Ensure continued interaction with DTN program (Weiss)  Update Threat Document with revised mission classes (Weiss)  Update Green Book based on ASI comments (to be supplied) (Weiss)  Post Identity-based encryption papers on DocuShare (Weiss)  Post WG slides on DocuShare (Weiss)  Post/email AIST key management report (after obtaining NASA release authorization) (Weiss)

11 Resource Problems  Resources are adequate to perform the initial tasks.  It has not yet been determined if resources are adequate to accomplish all the work currently on the schedule.  There was no ESA representation at this meeting which means that a large portion of CCSDS membership was not represented. This should must be fixed.

12 Risk Management Update  It is still unclear if enough resources are available from the Agencies to perform the necessary jobs.

13 Cross Area WG / BOF Issues  Security is a cross-cutting discipline that needs to be included in many other Areas and WGs. We discussed how this would be best performed – by having other WGs come to the Security WG for help or by having the Security WG go to the other groups to provide support.  It was felt that the proactive approach would work best but resource constraints will be an issue.  “Ratify” security architecture via vetting by other working groups  SOIS  SLS  CSS

14 Resolutions to be Sent to CESG and Then to CMC  Propose to include a security section template for all CCSDS documents with headings and explanatory text to help authors fill in the blanks.  Outline of security section:  Provide rationale and explanation as to why or why not security plays a role in this CCSDS document.  Template headings: 1.0 Security Background/Introduction 2.0 Statements of security concerns with respect to the CCSDS document:  data privacy  data integrity  authentication of communicating entities  control of access to resources  availability of resources  auditing of resource usage 3.0 Potential threats and attack scenarios (how could someone break the technology and why) 4.0 Consequences of not applying security to the technology (e.g., loss of life, loss of mission).

15 Resolutions to be Sent to CESG and Then to CMC  Resolution to the CESG to have the SecWG create a CCSDS security recommendations blue book, with the first standards being:  Proposal for a profile for an encryption standard based on FIPS 197 specification of AES-128  Proposal for a profile for an authentication/integrity standard based on FIPS 186-2 specification of the Digital Signature Standard.

16 New Working Items, New BOFs, etc.  Encryption recommendation.  Authentication recommendation.  Key Management recommendation.


Download ppt "Security WG: Report of the Spring 2004 Meeting May 13, 2004 Howard Weiss, NASA/JPL/SPARTA."

Similar presentations


Ads by Google