Summary

This Supplement provides the requirements for creation secure, stable and resilient national IP-based network infrastructure. The need for technical coordination (in creating secured, stable and resilient networks) arises in cases of failure (severe impairment of the quality of service) any significant segment of network, which is part of the public network. The national ICT infrastructure includes fixed and mobile networks as well as national segment of the Internet.

Security incidents may occur due to security problems: attacks like DoS/DDoS; attacks aimed at network infrastructure; natural and anthropogenic disasters and other problems related to deterioration stability (quality of services and features) and security. Under such circumstances the technical coordination means gathering, analysis and management information about incidents (including control information). This feature allows identifying threats and preparing the work of reconstruction.

This Supplement describes the architectural principles which ensure security, stability and recovery of the national ICT infrastructure in developing countries based on the IP-based protocol. Consistent application of the principle of "Cooperation for security" leads to the modern formation of federated trust framework (FTF) or the so-called federated space of trust (FST). This new formation usually distributed, then hosting services available to all participants of the collective security system at the national level. Any national telecom operators have the opportunity to join to FTF. The member of FTF have access to all security services which was deployed in the FTF by other operators and the administration NCNS.

FTF is organized as a stack of control planes: Security control plane, Information Exchange Plane, and Service Exchange Plane.

This Supplement opens a new dimension in security standardization – collaboration in security (alongside such works as security management, exchange of security incident and event information, application security, identification management, etc.).