Committed to connecting the world

WTISD

Question 8/13

Question 8/13 - Security and identity management in evolving managed networks (including software-defined networking)
(Continuation of Question 16/13)
Motivation
SG 13 is responsible for network-based security and identity management requirements and mechanisms in the context of all architectures developed within SG 13. This particular Question, leads security studies, and coordinates security matters across all Questions in SG 13.
While service providers of managed networks strive to provide the traditionally high degree of security, the threats on the evolving network infrastructure are on the increase – both in frequency and in complexity. This issue is complicated by the large number of organizations working on various aspects of security, making coordination and cooperation difficult and challenging. Recognizing that security is one of the defining features of the evolving managed networks, it is essential to put in place a set of standards that will guarantee, to the maximum degree possible, the expected levels of security. A few examples of new subjects under study in SG 13 that require new managed networks’ capabilities are cloud computing, content delivery, programmability, smart ubiquitous networking, self-configured networks, context-aware services, social media, peer-to-peer services, and machine-to-machine communications. In addition to responding to the end-users’ security demands, all of these, as well as other services, must meet stringent security requirements for provision of emergency telecommunications (ET). To this end, ET has special security needs that must be addressed by standards.
As SG 13 defines the respective managed networks’ architectures, it is evident that there is a need to address the relevant security aspects as part of the overarching effort. Consequently, this Question is motivated to provide the necessary network security specifications and guidance to accommodate the architecture-related work developed in SG 13.
In addition, Study Group 13 needs to address, in the context of the architectures it develops, the broad IdM issues of concern to service providers, governments, and end users.
As networks evolve and new security threats appear, for which there is no known remedy, such threats must be properly documented so as to enable the network administrators and end users to mitigate them. Accordingly, the security studies must address managed networks’ architectures to provide for
  • the appropriate network protection and information protection;
  • security solutions that apply over multiple administrative domains;
  • secure identity management.
The latest work program under the responsibility of this Question is available at:
The default approval procedure for all Recommendations developed in this Question is the Traditional Approval Process (TAP).
Question
Study Questions to be considered include, but are not limited to:
  • What are the security and identity management requirements for evolving managed networks as driven by new technologies (including software-defined networking - SDN) under the responsibility of SG 13?
  • What security mechanisms are needed to meet these requirements?
  • What enhancements to existing Recommendations are required to provide energy savings directly or indirectly in information and communication technologies (ICTs) or in other industries?
Tasks
Tasks include, but are not limited to:
  • Lead the security studies within Study Group 13
  • Ensure that the developed architecture is consistent with accepted security principles developed in ITU-T SG 17
  • Ensure that security solutions proposed in support of new technologies are consistent with security requirements of managed networks.
Specifically,
  • Define the interoperable identity management (IdM) constructs in support of all managed networks’ architectures under the responsibility of SG 13
  • Specify framework for the support of new authentication and authorization services within the managed network and define the appropriate mechanisms and procedures
  • Develop new ITU-T Recommendations or enhancements to the existing ITU-T Recommendations on security and identity management requirements and mechanisms in support of the above technologies
  • Help other Questions in SG 13 with developing the Security Considerations clauses of their respective ITU-T Recommendations
  • Consider what enhancements to existing Recommendations are required to provide energy conservation directly or indirectly in information and communication technologies (ICTs) or in other industries. Consider enhancements to developing of new Recommendations required to provide energy conservation.
Relationships
Recommendations:
  • Y.2700-series
Questions:
  • All SG 13 Questions
Study groups:
  • All ITU-T Study Groups, ITU-R, ITU-D
Standardization bodies, fora, and consortia:
  • ISO/IEC JTC1 SC 27
  • ATIS
  • ETSI
  • TIA
  • IETF
  • 3GPP and 3GPP2
  • OMA
  • TM Forum