Work item:
|
X.so-sap
|
Subject/title:
|
Guidelines for security orchestration of service access process
|
Status:
|
[Carried to next study period]
|
Approval process:
|
AAP
|
Type of work item:
|
Recommendation
|
Version:
|
New
|
Equivalent number:
|
-
|
Timing:
|
-
|
Liaison:
|
ITU-T SG13
|
Supporting members:
|
China, China Mobile
|
Summary:
|
Security requirements on one service access process need to be meet based on the security capabilities with the support of network capabilities. Especially, Multi-domain introduces different security requirements of different domains and inter-domain interaction security requirements in the service access process, which are variable and diverse. Security protection capabilities need to be selected and orchestrated in coordination with network routing in order to protect the service access process. Stakeholders such as security protection capability providers, network operators, integrators or third-party entities (e.g., consultants or knowledge bases) need to know how to work together under a unified, open and standardized security framework to build, integrate, interact and manage a secure service access process in a secure and low-cost way for end customers.
This new work item describes the orchestration framework which can be responsible for translating different security requirements to security capabilities deployed in different locations (possibly from different security vendors), orchestrating with the network, and building security processing sequences based on factors such as user requirements and load balancing.
|
Comment:
|
incubation queue
|
Reference(s):
|
|
|
Historic references:
|
Contact(s):
|
|
ITU-T A.5 justification(s): |
|
|
|
First registration in the WP:
2023-03-06 09:02:18
|
Last update:
2024-09-03 10:47:12
|