View
2
Download
0
Category
Preview:
Citation preview
ITU-T Achievements in ICT Security
Standardization
8th ETSI Security Workshop16 - 17 January 2013, Sophia Antipolis, France
Martin EuchnerAdvisor of Study Group 17
Martin.euchner@itu.int
January 2012
1/40
Contents
� Highlights from WTSA-12
� Brief recap of SG17 work program
� Update on SG17 Security Standardization Work
since the last ETSI Security Workshop:
� ITU-T Recommendations Approved or Approval Process � ITU-T Recommendations Approved or Approval Process
Initiated in 2012
� New Work Items Initiated in 2012
� Security Project
� Collaboration
� Possible areas of cooperation
� Useful references2/40
Highlights from the World Telecommunication
Standardization Assembly (WTSA-12)
Study Period 2013 – 2016 (1/2)
� WTSA-12 was the best-attended Assembly yet,attracting over 1000 participants from 101 countries.
� All 10 ITU-T Study Groups continue.
� New Review Committee established to ensure that ITU-T’s structure continues to meet the needs of the continually evolving and convergent ICT landscape.
� New ITU-T Recommendations will be accompanied by implementation guidelines (ref. Res.44).
3/40
� Nearly all existing 49 WTSA Resolutions modifiedand many of them strengthened,5 WTSA-08 Resolutions suppressed,6 new Resolutions; among on e-health, software-defined networking (SDN) and e-waste1 new Opinion.
Highlights from the World Telecommunication
Standardization Assembly (WTSA-12)
Study Period 2013 – 2016 (2/2)
� 7 of the 12 ITU-T A-series Recommendations were modified.
� JCA-CIT and work on TTCN-3 (ITU-T Z.160-Z.170 series) transferred from SG17 to SG11.
� Exact work split and responsibilities on Cloud Computing Security remain to be sorted out among SG13 and SG17.
4/40
NumberingSG 2
Tariffs, PolicySG 3
Performance, QoS,QoESG 12
Future Networks,Cloud ComputingSG 13
TSAG
ITU-T Study Groups
Review Committee
Climate Change& EnvironmentSG 5
BB Cable TVSG 9
Protocols& TestingSG 11
Cloud Computing
Access, Transport,Home NetworksSG 15
MultimediaSG 16
SecuritySG 17
5/40
ITU-T Lead Study Groups (1/3)
• SG2 – Operational aspects of service provision and telecommunication
management
Lead study group for service definition, numbering and routing
Lead study group on telecommunications for disaster relief/early warning,
network resilience and recovery
Lead study group on telecommunication management
• SG3 – Tariff and accounting principles including related telecommunication • SG3 – Tariff and accounting principles including related telecommunication
economic and policy issues
No LSG.
• SG5 – Environment and Climate Change
Lead study group on electromagnetic compatibility and electromagnetic
effects
Lead Study Group on ICTs and climate change
• SG9 – Television and sound transmission and integrated broadband cable
networks
Lead study group on integrated broadband cable and television networks 6/40
ITU-T Lead Study Groups (2/3)
• SG11 – Signalling requirements, protocols and test specifications
Lead study group on signalling and protocols
Lead study group on machine-to-machine (M2M) signalling and protocol
Lead study group on test specifications, conformance and interoperability
testing
• SG12 – Performance, QoS and QoE
Lead study group on quality of service and quality of experienceLead study group on quality of service and quality of experience
Lead study group on driver distraction and voice aspects of car
communications
• SG13 – Future networks including cloud computing, mobile and NGN
Lead study group for future networks
Lead study group on mobility management and NGN
Lead study group on cloud computing
7/40
ITU-T Lead Study Groups (3/3)
• SG15 – Networks, technologies and infrastructures for transport, access
and home
Lead study group on access network transport
Lead study group on optical technology
Lead study group on optical transport networks
Lead study group on smart grid
• SG16 – Multimedia coding, systems and applications
Lead study group on multimedia coding, systems and applicationsLead study group on multimedia coding, systems and applications
Lead study group on ubiquitous and Internet of things (IoT) applications
Lead study group on telecommunication/ICT accessibility for persons with
disabilities
Lead study group on intelligent transport system (ITS) communications
Lead study group on IPTV
• SG17 – Security
Lead study group on security
Lead study group on identity management (IdM)
Lead study group on languages and description techniques. 8/40
Study Group 17 Overview
� Primary focus is to build confidence and security in the use of Information and Communication Technologies (ICTs)
� Meets twice a year. Last meeting had 150 participants from 22 Member States, 18 Sector Members and 9 Associates.
� As of 2 October 2012, SG 17 is responsible for 300 approved Recommendations, 17 approved Supplements and 3 approved Implementer’s Guides in the E, F, X and Z series.
� Large program of work:
• 17 new work items added to work program in 2012
• 18 Recommendations, 5 Corrigenda, 2 Amendments, and 5 Supplements approved, or entered approval process in September 2012
• 87 new or revised Recommendations and other texts are under development for approval April 2013 or later
� See SG17 web page for more informationhttp://itu.int/ITU-T/studygroups/com17
9/40
SG17 – Terms of Reference - Mandate
• Responsible for building confidence and security in the use of
Information and Communication Technologies (ICTs).
This includes studies relating to cybersecurity, security
management, countering spam and identity management.
It also includes security architecture and framework, protection
of personally identifiable information, and security of
applications and services for the Internet of Things, smart grid, applications and services for the Internet of Things, smart grid,
smartphone, IPTV, web services, social network, cloud
computing, mobile financial system, and telebiometrics.
Also responsible for the application of open system
communications including directory and object identifiers, and
for technical languages, the method for their usage and other
issues related to the software aspects of telecommunication
systems, and for conformance testing to improve quality of
Recommendations.10/40
SG 17 Lead Study Group roles - Coordination & Collaboration
� 3 Lead Study Group responsibilities:
� Security,
� Identity management, and
� Languages and description techniques
� Joint Coordination Activity on Identity Management (JCA-IdM)(JCA-IdM)
� Joint Coordination Activity on Child Online Protection (JCA-COP)
The two JCAs will run in conjunction with ITU-T SG17 meeting(17 – 26 April 2013)
11/40
Security Project
� Security Coordination• Coordinate security matters within SG17, with ITU-T SGs,
ITU-D and externally with other SDOs
• Maintain reference information on LSG security webpage
� ICT Security Standards Roadmap• Searchable database of approved ICT security standards from
ITU-T, ISO/IEC, ETSI and othersITU-T, ISO/IEC, ETSI and others
� Security Compendium• Catalogue of approved security-related Recommendations
and security definitions extracted from approved Recommendations
� ITU-T Security Manual
• 5th edition published in 2013
12/40
SG17 Management Team
Chairman Arkadiy KREMER Russian Federation
Vice-Chairmen
Khalid BELHOUL United Arab Emirates
Mohamed M.K. ELHAJ Sudan
Antonio GUIMARAES Brazil
George LIN P.R. ChinaGeorge LIN P.R. China
Patrick MWESIGWA Uganda
Koji NAKAO Japan
Mario FROMOW RANGEL Mexico
Sacid SARIKAYA Turkey
Heung Youl YOUM Korea (Republic of)
13/40
Study Group 17, SecurityWTSA-12 assigned 12 Questions to SG17
� Q1/17 Telecommunication/ICT security coordination
� Q2/17 Security architecture and framework
� Q3/17 Telecommunications information security management
� Q4/17 Cybersecurity
� Q5/17 Countering spam by technical means
� Q6/17 Security aspects of ubiquitous telecommunication services� Q6/17 Security aspects of ubiquitous telecommunication services
� Q7/17 Secure application services
� Q8/17 Cloud computing security
� Q9/17 Telebiometrics
� Q10/17 Identity management architecture and mechanisms
� Q11/17 Generic technologies to support secure applications
� Q12/17 Formal languages for telecommunication software and testing
SG17 will be developing suitable Working Parties for those 12 Questions
14/40
Future Perspective of SG17 (I)
• SG17’s work on security has had continued and remarkable growth throughout the previous study period resulting in a centre of excellence – a core competency in security.
• Cybersecurity is one of the top priorities of the ITU, it is critical that this centre of security competence in ITU-T has been nurtured and enhanced, and is not fragmented.nurtured and enhanced, and is not fragmented.
• SG17 pioneered cloud computing security within ITU-T and takes a leading role for cloud computing security.SG17 utilizes Q8/17 as competence centre on cloud computing security within SG17 – continue coordinating and collaboration with SG13 on cloud computing (via JCA-Cloud).
15/40
Future Perspective of SG17 (II)
• The work on security in SG17 (including generic security architecture, mechanisms and management guidelines for heterogeneous networks/systems/services) is continued and SG17 is the lead study group for security to coordinate within the ITU and with other SDOs.– new emerging security technologies such as cloud computing, smart grid,
intelligent transportation systems, Internet-of-Things, IPTV security, IPv6 security, technical measures to protect the personally identifiable information (PII) of technical measures to protect the personally identifiable information (PII) of citizens as well as technical measures to protect children online all demand new approaches to security and novel security concepts to adequately address the inherent the crucial security threats in those technologies
• IdM plays such a critical role in building confidence and security in the use of ICTs, it is essential that this work is integral to the ITU-T security centre of competence, including SG17 being the lead study group for this issue to coordinate within ITU and with other SDOs.
16/40
Update on SG17 Security
Standardization Work since the last
7th ETSI SECURITY WORKSHOP, 18-19.01.20127th ETSI SECURITY WORKSHOP, 18-19.01.2012
17/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (1/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
2, Security
architecture
and framework
X.Suppl.15
(X.ncns-1)
Supplement to ITU-T X-series
Recommendations – X.800-X.849 series –
Supplement on guidance for creating national
IP-based public network security center for
developing countries
None Approved
developing countries
X.Suppl.16
(X.rev)
Supplement to ITU-T X-series
Recommendations – X.800-X.849 series –
Supplement on architectural systems for
security controls for preventing fraudulent
activities in public carrier networks
None Approved
3,
Telecommuni-
cations
information
security
management
X.1054
(X.isgf)
Information technology – Security techniques –
Governance of information security
ISO/IEC
27014
Approved
X.Suppl.13 Supplement to ITU-T X.1051 – Supplement on
information security management users’ guide
for Recommendation ITU-T X.1051
None Approved
18/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (2/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
4, Cybersecurity X.1500
Appendix I
Overview of cybersecurity information
exchange – Appendix I: Structured
cybersecurity information exchange
techniques
None Approved
X.1500
Amd.2
Overview of cybersecurity information
exchange – Amendment 2 – Revised
structured cybersecurity information
exchange techniques
None Approved
X.1500.1
(X.cybex.1)
Procedures for the registration of arcs under
the object identifier (OID) arc for
cybersecurity information exchange
None Approved
X.1524
(X.cwe)
Common weakness enumeration None Approved
X.1526
(X.oval)
Open vulnerability and assessment language None Determined
19/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (3/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
4, Cybersecurity X.1528
(X.cpe)
Common platform enumeration None Approved
X.1528.1
(X.cpe.1)
Common platform enumeration naming NISTIR
7695
Approved
X.1528.3 Common platform enumeration dictionary NISTIR ApprovedX.1528.3
(X.cpe.3)
Common platform enumeration dictionary NISTIR
7297
Approved
X.1528.4
(X.cpe.4)
Common platform enumeration applicability
language
NISTIR
7698
Approved
X.1541
(X.iodef)
Incident object description exchange format IETF RFC
5070
Approved
X.1544
(X.capec)
Common attack pattern enumeration and
classification
Determined
X.1580
(X.rid)
Real-time inter-network defense IETF RFC
6545
Approved
X.1581
(X.ridt)
Transport of real-time inter-network defense
messages
IETF RFC
6546
Approved
20/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (4/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
5, Countering
spam by
technical
means
X.Suppl.12 Supplement 12 to ITU-T X-series
Recommendations – ITU-T X.1240 –
Overall aspects of countering mobile
messaging spam
None Approved
means messaging spam
X.Suppl.14
(X.ics)
Supplement to ITU-T X.1243 –
Supplement on a practical reference
model for countering email spam
using botnet information
None Approved
21/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (5/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
6, Security
aspects of
ubiquitous
telecommuni-
X.1126
(X.msec-6)
Security aspects of smartphones None Determined
X.1194
(X.iptvsec-4)
Algorithm selection scheme for service and
content protection (SCP) descrambling
None Approvedtelecommuni-
cation services(X.iptvsec-4) content protection (SCP) descrambling
X.1196
(X.iptvsec-6)
Framework for the downloadable service
and content protection system in the
mobile Internet Protocol Television (IPTV)
environment
None Approved
X.1197
(X.iptvsec-7)
Guidelines on criteria for selecting
cryptographic algorithms for IPTV service
and content protection
None Approved
X.1313
(X.usnsec-3)
Security requirements for wireless sensor
network routing
None Approved
22/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (6/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
7, Secure
application
services
X.1154
(X.sap-4)
General framework of combined authentication on
multiple identity service provider environments
None Determined
X.1164
(X.p2p-4)
Use of service providers’ user authentication
infrastructure to implement public key infrastructure
for peer-to-peer networks
None Approved
X.Suppl.17 Supplement to ITU-T X-series Recommendations – None ApprovedX.Suppl.17
(X.websec-4)
Supplement to ITU-T X-series Recommendations –
ITU-T X.1143 – Supplement on threats and security
objectives for enhanced web-based
telecommunication service
None Approved
9, Telebiometrics X.1086 Amd.1 Telebiometrics protection procedures – Part 1: A
guideline to technical and managerial
countermeasures for biometric data security –
Amendment 1:Multibiometric protection procedures
None Approved
X.1091
(X.gep)
A guideline for evaluating telebiometric template
protection techniques
None Approved
10, Identity
management
architecture and
mechanisms
X.1254
(X.eaa)
Entity authentication assurance framework (ISO/IEC
29115)
Approved
23/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (7/13)
SG17
Question
Recommendation Action
Acronym Title Equivalent
11, Directory
services,
Directory systems,
and public-
key/attribute
certificates
E.115 (2010)
Cor.1
Computerized directory assistance –
Corrigendum 1
None Approved
X.500rev
(7th edition)
Information technology – Open Systems
Interconnection – The Directory: Overview of
concepts, models and services
ISO/IEC 9594-
1
Approved
certificates concepts, models and services
X.501 (2005)
Cor.4
Technical Corrigendum 4 to ITU-T X.509 (2005) |
9594-4:2005
ISO/IEC 9594-
2:2005 Cor.4
Approved
X.501 (2008)
Cor.2
Technical Corrigendum 2 to ITU-T X.501 (2008) |
ISO/IEC 9594-2:2008
ISO/IEC 9594-
2:2008 Cor. 2
Approved
X.501 (2008)
Cor.3
Technical Corrigendum 3 to ITU-T X.501 (2008) |
ISO/IEC 9594-2:2008
ISO/IEC 9594-
2:2008 Cor. 3
Approved
X.501rev
(7th edition)
Information technology – Open Systems
Interconnection – The Directory – Models
ISO/IEC 9594-
2
Approved
24/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (8/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
11, Directory
services,
Directory systems,
and public-
key/attribute
certificates
X.509 (2005)
Cor.4
Technical Corrigendum 4 to ITU-T X.509 (2005) | ISO/IEC
9594-8:2005
ISO/IEC 9594-
8:2005 Cor. 4
Approved
X.509 (2008)
Cor.2
Technical Corrigendum 2 to ITU-T X.509 (2008) | ISO/IEC
9594-8:2008
ISO/IEC 9594-
8:2008 Cor. 2
Approved
X.509 (2008)
Cor.3
Technical Corrigendum 3 to ITU-T X.509 (2008) | ISO/IEC
9594-8:2008
ISO/IEC 9594-
8:2008 Cor. 3
Approved
X.509rev
(7th edition)
Information technology – Open Systems Interconnection –
The Directory – Public-key and attribute certificate
frameworks
ISO/IEC 9594-8 Approved
X.511 (2005)
Cor.4
Technical Corrigendum 4 to ITU-T X.511 (2005) | ISO/IEC
9594-3:2005
ISO/IEC
9594-3:2005 Cor. 4
Approved
X.511 (2008)
Cor.2
Technical Corrigendum 2 to ITU-T X.511 (2008) | ISO/IEC
9594-3:2008
ISO/IEC 9594-
3:2008 Cor. 2
Approved
X.511 (2008)
Cor.3
Technical Corrigendum 3 to ITU-T X.511 (2008) | ISO/IEC
9594-3:2008
ISO/IEC 9594-
3:2008 Cor. 3
Approved
X.511rev
(7th edition)
Information technology – Open Systems Interconnection –
The Directory – Abstract Service Definition
ISO/IEC 9594-3 Approved
25/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (9/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
11, Directory
services,
Directory systems,
and public-
key/attribute
certificates
X.518 (2008)
Cor.2
Technical Corrigendum 3 to ITU-T X.518 (2008) | ISO/IEC
9594-2:2008
ISO/IEC 9594-
4:2008 Cor.2
Approved
X.518rev
(7th edition)
Information technology – Open Systems Interconnection –
The Directory – Procedures for Distributed Operations
ISO/IEC 9594-4 Approved
X.519 (2005)
Cor.3
Technical Corrigendum 3 to ITU-T X.519 (2005) | ISO/IEC
9594-9:2005
ISO/IEC 9594-
5:2005 Cor. 3
Approved
X.519 (2008)
Cor.2
Technical Corrigendum 2 to ITU-T X.519 (2008) | ISO/IEC
9594-5:2008
ISO/IEC 9594-
5:2008 Cor. 2
Approved
X.519rev
(7th edition)
Information technology – Open Systems Interconnection –
The Directory – Protocols
ISO/IEC 9594-5 Approved
X.520 (2005)
Cor.4
Technical Corrigendum 4 to ITU-T X.520 (2005) | ISO/IEC
9594-6:2005
ISO/IEC 9594-
6:2005 Cor. 4
Approved
X.520 (2008)
Cor.2
Technical Corrigendum 2 to ITU-T X.520 (2008) | ISO/IEC
9594-6:2008
ISO/IEC 9594-
6:2008 Cor. 2
Approved
X.520 (2008)
Cor.3
Technical Corrigendum 3 to ITU-T X.520 (2008) | ISO/IEC
9594-6:2008
ISO/IEC 9594-
6:2008 Cor.3
Approved
X.520rev
(7th edition)
Information technology – Open Systems Interconnection –
The Directory – Selected Attribute Types
ISO/IEC 9594-6 Approved
26/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (10/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
11, Directory
services,
Directory systems,
and public-
X.521rev
(7th edition)
Information technology – Open Systems
Interconnection – The Directory – Selected
object classes
ISO/IEC 9594-7 Approved
X.525rev Information technology – Open Systems ISO/IEC 9594-9 Approvedand public-
key/attribute
certificates
X.525rev
(7th edition)
Information technology – Open Systems
Interconnection – The Directory – Replication
ISO/IEC 9594-9 Approved
X.521 (2005)
Cor.1
Technical Corrigendum 1 to ITU-T X.521 (2005) |
ISO/IEC 9594-7:2005
ISO/IEC 9594-
7:2005 Cor. 1
Approved
X.521 (2008)
Cor.1
Technical Corrigendum 1 to ITU-T X.521 (2008) |
ISO/IEC 9594-7:2008
ISO/IEC
9594-7:2008 Cor. 1
Approved
27/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (11/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
12, Abstract
Syntax
Notation One
(ASN.1),
object
X.667rev Information technology –Procedures
for the operation of object identifiers
registration authority: Generation of
Universally Unique Identifiers (UUIDs)
and their use in object identifiers
ISO/IEC
9834-8
Consented
object
identifiers
(OIDs) and
associated
registration
and their use in object identifiers
X.691
Cor.2
Technical Corrigendum 2 to ITU-T
X.691| ISO/IEC 8825
ISO/IEC
8825-2
Cor.2
Approved
28/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (12/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
13, Formal
languages and
telecommunica-
tion software
Z.104
Amd.1
Data and action language in SDL-2010 – Amendment 1:
Annex C – Language Binding
None Approved
Z.107 Specification and Description Language: Object-oriented
data in SDL 2010
None Approved
Z.109rev UML Profile for SDL-2010 None Approved
Z.109
Amd.1
Unified modeling language (UML) profile for SDL-2010:
Amendment 1: Appendix I – Example language
specification
None Approved
Z.151
Cor.1
Technical Corrigendum 1 to ITU-T Z.151 None Approved
Z.151rev User requirements notation (URN) – Language definition None Approved
29/40
ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (13/13)
SG17
Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
14, Testing
languages,
methodologies
and framework
Z.161rev Testing and Test Control Notation version 3: TTCN-3 Core Language ETSI ES 201 873-1 Approved
Z.161.1 The Testing and Test Control Notation version 3: TTCN-3 language
extensions: Support of interfaces with continuous signals
ETSI ES 202 786 Approved
Z.164rev Testing and Test Control Notation version 3: TTCN-3 Operational Semantics ETSI ES 201 873-4 Approved
Z.165rev Testing and Test Control Notation version 3: TTCN-3 Runtime Interface (TRI) ETSI ES 201 873-5 ApprovedZ.165rev Testing and Test Control Notation version 3: TTCN-3 Runtime Interface (TRI) ETSI ES 201 873-5 Approved
Z.165.1 Testing and Test Control Notation version 3: TTCN-3 extension package:
Extended TRI
ETSI ES 202 789 Approved
Z.166rev Testing and Test Control Notation version 3: TTCN-3 Control Interface (TCI) ETSI ES 201 873-6 Approved
Z.167rev Testing and Test Control Notation version 3: TTCN-3 Using ASN.1 with
TTCN-3
ETSI ES 201 873-7 Approved
Z.168rev Testing and Test Control Notation version 3: TTCN-3 The IDL to TTCN-3
Mapping
ETSI ES 201 873-8 Approved
Z.169rev Testing and Test Control Notation version 3: TTCN-3 Using XML schema
with TTCN-3
ETSI ES 201 873-9 Approved
Z.170rev Testing and Test Control Notation version 3: TTCN-3 Documentation
Comment Specification
ETSI ES 201 873-10 Approved
30/40
17 New Work Items Initiated in 2012 (1/4)
SG17
Question
(2009-2012)
Draft Recommendation
Acronym Title
2, Security
architecture and
Framework
X.mgv6 Supplement to ITU-T X.ipv6-secguide – Supplement
on Security management guideline for
implementation of IPv6 environment
X.vissec Security of digital broadcasting and multimedia video X.vissec Security of digital broadcasting and multimedia video
information systems (VIS Security)
3,
Telecommunications
information security
management
X.sup1056 Supplement to ITU-T X.1056 – Related
Recommendations, International Standards and
documents for security incident management
31/40
17 New Work Items Initiated in 2012 (2/4)
SG17
Question
(2009-2012)
Draft Recommendation
Acronym Title
6, Security aspects of
ubiquitous
telecommunication
services
X.msec-7 Guidelines on the management of infected terminals in mobile
networks
X.msec-8 Secure application distribution framework for communication
devices
X.sgsec-1 Security functional architecture for smart grid services using X.sgsec-1 Security functional architecture for smart grid services using
telecommunication network
7, Secure application
services
X.sap-8 Efficient multi-factor authentication mechanisms using mobile
devices
X.sap-9 Delegated non-repudiation architecture based on ITU-T X.813
X.websec-5 Security architecture and operations for web mashup services
8, Cloud computing
security
X.goscc Guideline of operational security for cloud computing
32/40
17 New Work Items Initiated in 2012 (3/4)
SG17
Question
(2009-2012)
Draft Recommendation
Acronym Title
10, Identity
management
architecture and
mechanisms
X.iamt Identity and access management taxonomy
X.scim-use Application of system for cross identity management (SCIM)
in telecommunication environments
X.pki-em Information Technology – Public-Key Infrastructure: 11, Directory services,
Directory systems,
and public-
key/attribute
certificates
X.pki-em Information Technology – Public-Key Infrastructure:
Establishment and maintenance
X.pki-prof Information Technology – Public-Key Infrastructure: Profile
13, Formal languages
and
telecommunication
software
Z.109 Amd. 1 Unified modeling language (UML) profile for SDL-2010:
Amendment 1: Appendix I – Example language specification
33/40
17 New Work Items Initiated in 2012 (4/4)
SG17
Question
(2009-2012)
Draft Recommendation
Acronym Title
14, Testing
languages,
methodologies and
framework
Z.161.1 The Testing and Test Control Notation version 3: TTCN-3
language extensions: Support of interfaces with
continuous signals
Z.165.1 Testing and Test Control Notation version 3: TTCN-3 framework
Z.165.1 Testing and Test Control Notation version 3: TTCN-3
extension package: Extended TRI
34/40
Security Coordination
Security activities in other ITU-T Study Groups� ITU-T SG2 Operational aspects & TMN
– International Emergency Preference Scheme, ETS/TDR
– Network and service operations and maintenance procedures, E.408
– TMN security, TMN PKI
� ITU-T SG9 Integrated broadband cable and TV
– Conditional access, copy protection, HDLC privacy,
– DOCSIS privacy/security
– IPCablecom 2 (IMS w. security), MediaHomeNet security gateway, DRM,
� ITU-T SG11 Signaling Protocols and Testing
– EAP-AKA for NGN
– methodology for security testing and test specification related to security testing
� ITU-T SG13 Future networks including cloud computing, mobile and NGN
– Security and identity management in evolving managed networks
– Deep packet inspection
� ITU-T SG15 Networks and infrastructures for transport, access and home
– Reliability, availability, Ethernet/MPLS protection switching
� ITU-T SG16 Multimedia
– Secure VoIP and multimedia security (H.233, H.234, H.235, H.323, JPEG2000) 35/40
Possible areas of cooperation between
ITU-T SG17 and ETSI� All 12 ITU-T SG17 Questions
� JCA-IdM
� JCA-COP
And specifically onAnd specifically on
� Mobile/smartphone security
� Intelligent Transport Systems security
� Identity Management
� M2M/IoT security36/40
Coordination with other bodies
ITU-D, ITU-R,
xyz…
Study Group 17
37/40
Other ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (1/2)SG Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
13 17, Packet forwarding and
deep packet inspection for
multiple services in packet-
based networks and NGN
environment
Y.2770 Requirements for deep packet
inspection in next generation
networks
None Approved
21, Future networks Y.3031 Identification framework in future
networks
None Approved
networks
24, Service scenarios,
deployment models and
migration issues
Supplement
19 to Y.2200-
series
Risk analysis service over Next
Generation Network
None Approved
15 6, Characteristics of optical
systems for terrestrial
transport networks
G.664 Optical safety procedures and
requirements for optical transport
systems
None Approved
WP2 /15, Optical access/
transport network
technologies and physical
infrastructures
Series G
Supplement
51
Passive Optical Network (PON)
protection considerations
None Approved
9, Transport equipment and
network protection/
restoration
Series G
Supplement
52
Ethernet ring protection switching None Approved
38/40
Other ITU-T Recommendations Approved or
Approval Process Initiated in 2012 (2/2)
SG Question
(2009-2012)
Recommendation Action
Acronym Title Equivalent
16 25, USN
applications
and services
H.642.1 Multimedia information access triggered by tag-
based identification - Part 1 Identification
scheme.
None Approved
H.642.2 Multimedia information access triggered by tag-
based identification - Part 2 Registration
procedures for identifier
None Approved
H.642.3 Information technology - Automatic
identification and data capture technique -
Identifier resolution protocol for multimedia
information access triggered by tag-based
identification
ISO/IEC
29177
Approved
39/40
Reference links
� Webpage for ITU-T Study Group 17
• http://itu.int/ITU-T/studygroups/com17
� Webpage on ICT security standard roadmap
• http://itu.int/ITU-T/studygroups/com17/ict
� Webpage on ICT cybersecurity organizations
• http://itu.int/ITU-T/studygroups/com17/nfvo
� Webpage for JCA on Identity management
• http://www.itu.int/en/ITU-T/jca/idm/Pages/default.aspx
� Webpage for JCA on Child Online Protection
• http://itu.int/en/ITU-T/jca/cop
� Webpage on lead study group on security
• http://itu.int/en/ITU-T/studygroups/com17/Pages/telesecurity.aspx
� Webpage on lead study group on identity management
• http://itu.int/en/ITU-T/studygroups/com17/Pages/idm.aspx
� Webpage on lead study group on languages and description techniques
• http://itu.int/en/ITU-T/studygroups/com17/Pages/ldt.aspx
� Webpage for WTSA-12 Results
• http://www.itu.int/en/ITU-T/wtsa12/Pages/resolutions.aspx
40/40
Thank you!Thank you!
Martin EuchnerAdvisor of Study Group 17
Martin.euchner@itu.int
41/40
Recommended