itu-t recommendation x.805 security architecture for systems providing end-to-end communications

20
ITU-T Recommendation X.805 Security Architecture for Systems Providing End-to-End Communications IETF 63 meeting Zachary Zeltsan, Bell Laboratories, Lucent Technologies Rapporteur of Question 5 SG 17

Upload: colman

Post on 22-Jan-2016

80 views

Category:

Documents


1 download

DESCRIPTION

ITU-T Recommendation X.805 Security Architecture for Systems Providing End-to-End Communications. IETF 63 meeting. Zachary Zeltsan, Bell Laboratories, Lucent Technologies Rapporteur of Question 5 SG 17. Outline. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

ITU-T RecommendationX.805 Security Architecture for Systems Providing End-to-End

Communications

IETF 63 meeting

Zachary Zeltsan, Bell Laboratories,

Lucent TechnologiesRapporteur of Question 5 SG 17

Page 2: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

2

Outline

Origin of the ITU-T Recommendation X.805 - Security Architecture for Systems Providing End-to-End Communications

Three main issues that X.805 addresses Security Dimensions Security Layers Security Planes ITU-T X.805 Security Architecture ITU-T Recommendation X.805 as a base for security work in

FGNGN Security Capability WG

Page 3: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

3

Origin of the ITU-T Recommendation X.805

• ITU-T Recommendation X.805 Security architecture for systems providing end‑to‑end communications had been developed by ITU-T SG 17 (ITU-T Lead Study Group on Telecommunication Security) and was published in October 2003.

• The group has developed a set of the well-recognized Recommendations on security. Among them are X.800 Series of Recommendations on security and X.509 - Public-key and Attribute Certificate Frameworks.

Page 4: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

4

Three main issues that X.805 addresses

The security architecture addresses three essential issues:

1. What kind of protection is needed and against what threats?

2. What are the distinct types of network equipment and facility groupings that need to be protected?

3. What are the distinct types of network activities that need to be protected?

Page 5: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

5

ITU-T X.800 Threat Model(simplified)

X

X1 - Destruction (an attack on availability):

– Destruction of information and/or network resources

2 - Corruption (an attack on integrity):

– Unauthorized tampering with an asset

3 - Removal (an attack on availability):

– Theft, removal or loss of information and/or other resources

4 - Disclosure (an attack on confidentiality):

– Unauthorized access to an asset

5 - Interruption (an attack on availability):

– Interruption of services. Network becomes unavailable or unusable

Page 6: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

6

Access Control

Authentication

Non-repudiation

Data Confidentiality

Communication Security

Data Integrity

Availability

Privacy

• Limit & control access to network elements, services & applications

• Examples: password, ACL, firewall

• Prevent ability to deny that an activity on the network occurred

• Examples: system logs, digital signatures

• Ensure information only flows from source to destination

• Examples: VPN, MPLS, L2TP

• Ensure network elements, services and application available to legitimate users

• Examples: IDS/IPS, network redundancy, BC/DR

• Provide Proof of Identity• Examples: shared secret,

PKI, digital signature, digital certificate

• Ensure confidentiality of data • Example: encryption

• Ensure data is received as sent or retrieved as stored

• Examples: MD5, digital signature, anti-virus software

• Ensure identification and network use is kept private

• Examples: NAT, encryption

Eight Security Dimensions Address the Breadth of Network

Vulnerabilities

Eight Security Dimensions applied to each Security Perspective (layer and plane)

Page 7: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

7

How the Security Dimensions Map to the Security Threats

SecurityDimension

X.800 Security Threats

Destruction Corruption Removal Disclosure Interruption

Access Control

Authentication

Non-Repudiation Data Confidentiality Communication Security

Data Integrity

Availability

Privacy

Page 8: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

8

Security Layers

• Concept of Security Layers represents hierarchical approach to securing a network

• Mapping of the network equipment and facility groupings to Security Layers could be instrumental for determining how the network elements in upper layers can rely on protection that the lower layers provide.

Page 9: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

9

Three Security Layers

• Each Security Layer has unique vulnerabilities, threats• Infrastructure security enables services security enables applications security

Infrastructure Security

Applications Security

Services Security

THREATS

VULNERABILITIES

ATTACKS

Destruction

Disclosure

Corruption

Removal

Infrastructure Security

Applications Security

Services SecurityVULNERABILITIES

InterruptionVulnerabilities Can ExistIn Each Layer

1 - Infrastructure Security Layer:• Fundamental building blocks of networks

services and applications• Examples:

– Individual routers, switches, servers– Point-to-point WAN links– Ethernet links

2 - Services Security Layer:• Services Provided to End-Users• Examples:

– Frame Relay, ATM, IP– Cellular, Wi-Fi,– VoIP, QoS, IM, Location services– Toll free call services

3 - Applications Security Layer:• Network-based applications accessed by

end-users• Examples:

– Web browsing– Directory assistance– Email– E-commerce

Page 10: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

10

Example: Applying Security Layers to IP Networks

Applying Security Layers to IP Networks

Infrastructure Security Layer– Individual routers, servers– Communication links

Services Security Layer– Basic IP transport– IP support services (e.g., AAA, DNS, DHCP)– Value-added services: (e.g., VPN, VoIP, QoS)

Applications Security Layer– Basic applications (e.g. FTP, web access)– Fundamental applications (e.g., email)– High-end applications (e.g., e-commerce, e-training)

Page 11: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

11

Security Planes

• Concept of Security Planes could be instrumental for ensuring that essential network activities are protected independently (e.g. compromise of security at the End-user Security Plane does not affect functions associated with the Management Security Plane).

• Concept of Security Planes allows to identify potential network vulnerabilities that may occur when distinct network activities depend on the same security measures for protection.

Page 12: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

12

• Security Planes represent the types of activities that occur on a network.• Each Security Plane is applied to every Security Layer to yield nine security

Perspectives (3 x 3)• Each security perspective has unique vulnerabilities and threats

Three Security Planes

Infrastructure Security

Applications Security

Services Security

End User Security

Control/Signaling Security

Management Security

VULNERABILITIES

Security Layers

Security Planes

Infrastructure Security

Applications Security

Services Security

End User Security

Control/Signaling Security

Management Security

VULNERABILITIES

Security Layers

Security Planes

Vulnerabilities Can ExistIn Each Layer and Plane

THREATS

ATTACKS

Destruction

Disclosure

Corruption

Removal

Interruption

1 - End-User Security Plane:• Access and use of the network by the

customers for various purposes:– Basic connectivity/transport– Value-added services (VPN, VoIP, etc.)– Access to network-based applications

(e.g., email)

2 - Control/Signaling Security Plane:• Activities that enable efficient functioning of

the network• Machine-to-machine communications

3 - Management Security Plane:• The management and provisioning of

network elements, services and applications

• Support of the FCAPS functions

Page 13: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

13

Example: Applying Security Planes to Network Protocols

End User Security Plane Activities

•End-user data transfer•End-user – application interactions

Protocols• HTTP, RTP, POP, IMAP• TCP, UDP, FTP• IPsec, TLS

Control/Signaling Security Plane Activities

•Update of routing/switching tables•Service initiation, control, and teardown•Application control

Protocols

• BGP, OSPF, IS-IS, RIP, PIM

• SIP, RSVP, H.323, SS7.• IKE, ICMP• PKI, DNS, DHCP, SMTP

Management Security Plane

•Operations•Administration•Management•Provisioning

Activities Protocols•SNMP•Telnet•FTP•HTTP

Page 14: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

14

Acc

ess

Man

agem

ent

Infrastructure Security

Applications Security

Services Security

End User Security

Control/Signaling Security

Management Security

8 Security Dimensions

Dat

a C

on

fid

enti

ali

ty

Co

mm

un

icat

ion

Sec

uri

ty

Inte

gri

ty

Ava

ila

bil

ity

Pri

vacy

Au

then

tic

atio

n

No

n-re

pu

dia

tio

n

Security Layers

Security PlanesA

cces

s C

on

tro

l

Infrastructure Security

Applications Security

Services Security

End User Security

Control/Signaling Security

Management Security

THREATS

VULNERABILITIES

8 Security Dimensions

ATTACKS

Dat

a C

on

fid

enti

ali

ty

Co

mm

un

icat

ion

Sec

uri

ty

Dat

a In

teg

rity

Ava

ila

bil

ity

Pri

vacy

Au

then

tic

atio

n

No

n-re

pu

dia

tio

n

Security Layers

Security Planes

ITU-T X.805: Security Architecture for Systems Providing End-to-End

Communications

Vulnerabilities Can ExistIn Each Layer, Plane

Destruction

Disclosure

Corruption

Removal

Interruption

Page 15: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

15

– Management Network: top row – Network Services: middle column– Security Module: Layer & Plane

Intersection

Access Control

Authentication

Non-repudiation

Data Confidentiality

Infrastructure Layer

Services LayerApplications

Layer

Management Plane Module one Module four Module seven

Control/Signaling Plane

Module two Module five Module eight

User PlaneModule three Module six Module Nine

Communication Security

Data Integrity

Availability

Privacy

The eight Security Dimensions Are Applied to Each Security Module

Modular Form of X.805

Provides a systematic, organized way for performing network security assessments and planning

Page 16: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

16

Module 3 – Infrastructure Layer – End-User Plane

ww

w.l

uc

en

t.c

om

/se

cu

rity

Security Dimension

Security Objectives

Access ControlEnsure that only authorised personnel or devices are allowed access to end-user data that is transiting a network element or communications link or is resident in an offline storage device.

Authentication

Verify the identity of the person or device attempting to access end-user data that is transiting a network element of communications link or is resident in an offline storage device.

Authentication techniques may be required as part of Access Control.

Non-Repudiation

Provide a record identifying each individual or device that accessed end-user data that is transiting a network element or communications link, or is resident in offline devices and that the action was performed. The record is to be used as proof of access to end-user data.

Data Confidentiality

Protect end-user data that is transiting a network element or communications link, or is resident in an offline storage device against unauthorised access or viewing. Techniques used to address access control may contribute to providing data confidentiality for end-user data.

Communication Security

Ensure that end-user data that is transiting a network element or communications link is not diverted or intercepted as it flows between the end points (without an authorised access)

Data Integrity Protect end-user data that is transiting a network element or communications link or is resident in offline storage devices against unauthorised modification, deletion, creation and replication.

Availability Ensure that access to end-user data resident in in offline storage devices by authorised personnel and devices cannot be denied.

PrivacyEnsure that network elements do not provide information pertaining to the end-users network activities (eg. Users geographic location, websites visited, content etc.) to unauthorised personnel.

Page 17: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

17

Summary: X.805 Provides a Holistic Approach to Network

Security Comprehensive, end-to-end network view of security

Applies to any network technology– Wireless, wireline, optical networks– Voice, data, video, converged networks

Applies to variety of networks– Service provider networks– Enterprise (service provider’s customer) networks– Government networks– Management/operations, administrative networks– Data center networks

Is aligned with other security ITU-T Recommendations and ISO standards

Page 18: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

18

ITU-T Recommendation X.805 is a Base for Security work in FGNGN

Security Capability WG

Guidelines for NGN security and X.805 NGN threat model (based on ITU-T X.800 and X.805

Recommendations)

Security Dimensions and Mechanisms (based on ITU-T X.805)Access controlAuthenticationNon-repudiationData confidentiality

Communication securityData integrityAvailabilityPrivacy

NGN security requirements for Release 1 and X.805 General considerations based on the concepts of X.805

Page 19: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

19

AcronymsAAA Authentication, Authorization, Accounting

ACL Access Control List

ATM Asynchronous Transfer Mod

BC Business Continuity

BGP Border Gateway Protocol

DHCP Dynamic Host Configuration Protocol

DNS Domain Name Service

DR Disaster Recovery

FCAPS Fault-management, Configuration, Accounting, Performance, and Security

FTP File Transfer Protocol

HTTP Hyper Text Transfer Protocol

ICMP Internet Control Message Protocol

IDS Intrusion Detection System

IKE Internet Key Exchange protocol

IM Instant Messaging

IMAP Internet Message Access Protocol

IPS Intrusion Prevention System

IPsec IP security (set of protocols)

IS-IS Intermediate System-to-Intermediate System (routing protocol)

L2TP Layer Two Tunneling Protocol

MPLS Multi-Protocol Label Switching

NAT Network Address Translation

OSPF Open Shortest Path First

PIM Protocol-Independent Multicast

PKI Public Key Infrastructure

POP Post Office Protocol

QoS Quality of Service

RIP Routing Information Protocol

RSVP Resource Reservation Setup Protocol

RTP Real-time Transport Protocol

SIP Session Initiation Protocol

SMTP Simple Mail Transfer Protocol

SNMP Simple Network Management Protocol

SS7 Signaling System 7

TCP Transmission Control Protocol

TLS Transport Layer Security protocol

UDP User Datagram Protocol

VoIP Voice over IP

VPN Virtual Private Network

Page 20: ITU-T Recommendation X.805  Security Architecture for Systems Providing End-to-End Communications

20

Thank you!