T1M1: Management Plane Security Standard (T1.276)



Similar documents
3GPP TS V8.0.0 ( )

Network Security Guidelines. e-governance

Central Agency for Information Technology

GE Measurement & Control. Cyber Security for NEI 08-09

Rajan R. Pant Controller Office of Controller of Certification Ministry of Science & Technology rajan@cca.gov.np

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

Basics of Internet Security

Office of Inspector General

Cisco Prime Optical. Overview

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

COSC 472 Network Security

State of Texas. TEX-AN Next Generation. NNI Plan

Securing VoIP Networks using graded Protection Levels

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

ETSI TR V1.1.2 ( )

INFORMATION TECHNOLOGY SECURITY STANDARDS

Developing Network Security Strategies

Draft ITU-T Recommendation X.805 (Formerly X.css), Security architecture for systems providing end-to-end communications

Security Issues with Integrated Smart Buildings

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

TICSA. Telecommunications (Interception Capability and Security) Act Guidance for Network Operators.

Comprehensive Network Security Approach: Security Breaches at Retail company- A Case Study

Securing Data on Microsoft SQL Server 2012

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

NETWORK AND SERVICES MANAGEMENT AND CONTROL MSc MODULE (EEM.nsm)

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Best Practices for PCI DSS V3.0 Network Security Compliance

MS-55096: Securing Data on Microsoft SQL Server 2012

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Fundamentals of Network Security - Theory and Practice-

New Systems and Services Security Guidance

NERC CIP VERSION 5 COMPLIANCE

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

IBX Business Network Platform Information Security Controls Document Classification [Public]

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

ENTERPRISE IT SECURITY ARCHITECTURE SECURITY ZONES: NETWORK SECURITY ZONE STANDARDS. Version 2.0

Cloud security architecture

Achieving PCI Compliance Using F5 Products

Information and Communication Technology. Firewall Policy

Security Controls for the Autodesk 360 Managed Services

TimePictra Release 10.0

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

ETSI TS V1.1.1 ( ) Technical Specification

Snow Agent System Pilot Deployment version

05.0 Application Development

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

BMC s Security Strategy for ITSM in the SaaS Environment

CONTENTS. PCI DSS Compliance Guide

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17

PARAMETERS TO BE MONITORED IN THE PROCESS OF OPERATION WHEN IMPLEMENTING NGN TECHNICAL MEANS IN PUBLIC TELECOMMUNICATION NETWORKS

Remote Administration

March

Accelerating PCI Compliance

This document is a preview generated by EVS

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

HANDBOOK 8 NETWORK SECURITY Version 1.0

Weighted Total Mark. Weighted Exam Mark

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

PCI Data Security Standards (DSS)

Third Party Network Management Standard Best practice

Society, Law Enforcement and the Internet

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Vendor Assessment Worksheet:

Security Controls What Works. Southside Virginia Community College: Security Awareness

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

PCI Compliance. Top 10 Questions & Answers

Automation Suite for. 201 CMR Compliance

Network Segmentation

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Securing the Service Desk in the Cloud

That Point of Sale is a PoS

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

OIG. Improvements Are Needed for Information Technology Controls at the Las Vegas Finance Center. Audit Report OFFICE OF INSPECTOR GENERAL

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

ISO27001 Controls and Objectives

THE FUTURE OF SMART GRID COMMUNICATIONS

CTR System Report FISMA

Title: Data Security Policy Code: Date: rev Approved: WPL INTRODUCTION

Nakina Multi-Vendor Security Management Secure Your Network Operations

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Recommended IP Telephony Architecture

Transcription:

T1M1/2003-039 R3 July 9, 2003 T1M1: Management Plane Security Standard (T1.276) Presentation Contributors and Liaison Representatives: Mike Fargano - T1M1 Chair, michael.fargano@qwest.com Jim Stanco - T1M1 Vice Chair (previous), jim.stanco@aol.com Lakshmi Raman - T1M1.5 Chair, lraman@sunreyes.com Mike McGuire - T1M1 Security Team Lead, mm8631@sbc.com Rod Wallace - T1M1 Security SME, rod.wallace@nortelnetworks.com Chris Lonvick - T1M1 Security SME, clonvick@cisco.com Note: This presentation is for general information sharing purposed only refer to T1.276 American National Standard (and/or latest draft proposed ANS) for details and clarifications. 1

Outline Why Care? T1M1 Overview OAM&P Simplified Reference Model T1M1 History in Security Management Plane Security: Business Drivers/Case and Motivation Objective Driving Principles Network Mgt Security Reference Model Summary/Status, Challenges, Contributors 2

Why Care? Network Management Security Risk From ATIS/T1 Press Release on T1M1 Security Work (http://www.atis.org/atis/press/pressreleases2002/100202.htm): A security breach of a NE or OSS at the Management Plane could include a major incursion into the network by an intruder, leading to loss of integrity and service of the elements and a major network outage or disruption. 3

T1M1 - Overview Telecom Network Management Operations, Administration, Maintenance, and Provisioning (OAM&P); Technical Subcommittee of Committee T1 ANSI Accredited USA SDO Major Programs: Common OAM&P Functionality and Technology Inter-Administration OAM&P (OSS Interconnect) Network Technology-Specific OAM&P OAM&P Security: Part of each major program; bulk of work in Common OAM&P Functionality and Technology program 4

OAM&P Simplified Systems Interface Reference Model Core OSSs Q EMSs Q X CORBA, tml (XML), Suite of standard telecom B2B (interconnect) interfaces tml(xml), EDI, CORBA,... Q SNMP, CORBA, TL1, MML, Network 5

T1M1 History in Security Network Management Security Areas: NEs and OSSs OAM&P interfaces NS/EP, Emergency Telecom Services (ETS), Lawfully Authorized Electronic Surveillance 1980 s to 2001: Many standards per above (see document T1M1/2002-006 for history to 2001 ftp://ftp.t1.org/t1m1/m1.0/2002/2m100060.pdf) 2002/2003: Management Plane Security Standard Collaboration with T1M1, NSTAC NSIE, Gov NSIE, + liaisons 6

Mgt Plane Sec Business Drivers Net Mgt Security Standard Business Drivers: Efficiency: Reduced costs via commonality - economies of scale Effectiveness: Common baseline for security functionality - reasonable risk management Common baseline network management security requirements for NEs and OSSs to build network technology specific OAM&P security specifications and standards upon (e.g., optical network OAM&P security) 7

Mgt Plane Sec Business Case The general business rational to implement the Management Plane Security Standard is that it: 1. Raises the baseline OAM&P security requirements to meet the new (current) realized security risks and; 2. Provides for the new minimum cost zone between relatively too little security and too much security (with the relative high costs that come with these two extremes). 8

Mgt Plane Sec Business Case Framework High Total Cost (risk based plus direct & indirect costs) Low Generic security business case is Risk Management based. A given curve represents the cost/security tradeoffs given a set of realized (i.e., accountable) threats, vulnerabilities, risk based incident/attack costs, and direct/indirect security costs. High risk. High. direct/ based costs indirect costs Cost Savings Opportunity. Minimum cost zone is at the bottom of the curve -between relatively too little security and too much security (with the relative high costs that come with these two extremes). Low Security Level High 9

Mgt Plane Sec Business Case with Increased Security Risks High Total Cost (risk based plus direct & indirect costs) Low Old Security Scenario New Security Scenario New curve based on realization of new set of increased threats, vulnerabilities, incident/attack costs, and security costs e.g., post 9/11 Low Security Level High 10

Mgt Plane Sec Business Case: Cost Shifts w/ Increased Security Risks High Total Cost (risk based plus direct & indirect costs) Low To capture the new minimum cost zone while the new security scenario is in play the Security Level must be increased. Old. New.. B C A C Cost Savings Opportunity Being at the old minimum cost Security Level while the new security scenario is in play puts an organization in a relatively high Total Cost position. Low A SL B SL Security Level High 11

Mgt Plane Sec Motivation A major concern to NSIE and T1M1 is that network infrastructure is a terrorist target, identified as part of National Critical Infrastructure. Our industry is transitioning to converged packet networks resulting in an increased sense of vulnerability. Service providers are specifying similar but different security requirements for products resulting in inconsistent vendor feature sets. System Integration and operations costs increase when dealing with vendors products that have differing security features and functionality. Infrastructure Security adds cost without generating additional revenue for both vendors and service providers alike. 12

Mgt Plane Sec - Network (NGN) Security Challenges Then Now Isolated Network Public Network Management Control/Signaling Management Control/Signaling Bearer/Data Bearer/Data Public Network Public traffic and management/control traffic were sent on separate networks. Threats in Public network were insulated from network management and control Management and Control network was easier to secure e.g., known users. Public traffic and management/control traffic are sent on the same network. Threats in Public network are now threats to network management and control Management and Control network now needs higher security level, e.g., security level that is applied to secure Public traffic. 13

Mgt Plane Sec - Objective Define a consistent and standardized set of baseline network element and network management security requirements. Standardize this set of security requirements within standards organizations such as T1M1 and ITU-T (SG4). These requirements will: Ensure a minimal baseline of security throughout the industry. Provide vendors with a standard set of design objectives in relation to product and network security features. Make it easier for service providers to procure & build a secure infrastructure comprised of multiple vendor platforms. 14

Mgt Plane Sec - Key Principles Secure management traffic with strong encryption and authentication. Authenticate and attribute all management actions. Maintain secure logs for all of the above. 15

Network Management Security Reference Model 4. Remote Operator To NMS 12. EMS to EMS Network Management System 1. NMS to EMS 7. Local Operator To NMS 2. NMS to NE Remote Operator 6. Remote Operator To NMS 5. Remote Operator To EMS Element Management Element Management System System 3. EMS to NE Network Element Local Operator 8. Local Operator To NMS 9. Local Operator To NE 10. NE to NE 11. NE to Foreign NE Network Element Multi-Vendor Network Element 16

Mgt Plane Sec - Summary/Status Started work in NSIE with intent to make OAM&P security best practice recommendations public. NSIE and T1M1 agreed that T1M1 adoption was an effective means to make document public and standard. Status: Draft Standard (T1.276) Letter Ballot process completed - see document T1M1.5/2003-007R5 Final (official) publication version should be available by end of July 2003. Recommendations brought to the NRIC VI Workgroup 1B for inclusion in Cyber-security OAM Best Practices. Submitted to the ITU-T (SG4) for adoption as an International Standard (ITU-T Recommendation). 17

Mgt Plane Sec Challenges To have the standard used and implemented - ASAP There is evidence that this is happening. Wide spread adoption of the standard. Vendors and Service Provider contributors are working this now. 18

Mgt Plane Sec Key Contributors BellSouth BT DoD/NorAD Lucent Qwest Siemens Verizon Booz-Allen Hamilton Cisco Harris Nortel Networks SBC Telcordia Worldcom 19

Management Plane Security Appendix: Backup Slides 20

Security Framework Model Application Security VULNERABILITIES Service Security Access Management Authentication Non - repudiation Data Security Communication Security Integrity Availability Privacy THREATS Interruption Interception Modification Fabrication Infrastructure Security ATTACKS End User Plane Control Plane Security Dimensions Management Plane 21

Document Contents 0 FOREWORD 1 INTRODUCTION 2 SCOPE, PURPOSE, AND APPLICATION Framework and Model Design Guidelines Applicability of this document to the TMN 3 NORMATIVE REFERENCES 4 DEFINITIONS, ABBREVIATIONS, ACRONYMS, AND SYMBOLS 5 SECURITY REQUIREMENTS 5.1 Cryptographic Algorithms and Keys 5.1.1 Symmetric Encryption Algorithms 5.1.2 Asymmetric Encryption Algorithms 5.1.3 Data Integrity Algorithms 5.1.4 Keys for Cryptographic Algorithms 5.1.5 Cryptographic Key Management 5.2 Authentication 5.2.1 Server-to-Server Process Authentication 5.2.2 User Authentication, Static Passwords, and User IDs 5.3 Administration 5.3.1 Security Administration 5.3.2 Authentication Defaults 5.3.3 Security Audit Logging 5.4 NE/MS Use and Operation 5.4.1 Login Process 5.4.2 Logout Process 5.4.3 Applications Appendix ARCHITECTURAL CONSIDERATIONS AND EXAMPLES Background and Scope 59 Mandatory Security Requirements Examples 22

Document Annex B ADDITIONAL SECURITY CONSIDERATIONS B.1 Applicability to Enterprise OAM&P B.2 CORBA, SNMP, XML, and SOAP B.2.1 CORBA B.2.2 SNMP Security B.2.3 XML B.2.4 SOAP B.3 Communications Assistance to Law Enforcement Act B.4 Physical Security Considerations B.4.1 Physical Premises Security B.4.2 Building Services B.4.3 Environmental and Geographical Threats B.4.4 Co-location Procedures B.5 Development Process B.5.1 Bootstrapping, Installation, and Failure Modes B.5.2 Patching Process B.5.3 Development Life Cycle Security B.5.3.1 Personnel Management B.5.3.2 Security Awareness and Training B.5.3.3 Risk Management B.5.3.4 Requirements B.5.3.5 Design B.5.3.6 Separation of Duty B.5.3.7 Implementation B.5.3.8 Documentation B.5.3.9 Operating System B.5.3.19 Secure Installation, Configuration, and Operation Additional Security Considerations (Informational, outside the scope of the detailed security requirements) 23

Example Mandatory Requirements Secure management traffic with STRONG ENCRYPTION and authentication: M55: For each physical or logical interface that carries any MANAGEMENT TRAFFIC in an NE/MS, the NE/MS shall be configurable to secure MANAGEMENT TRAFFIC with STRONG AUTHENTICATION and symmetric or asymmetric encryption in order to provide confidentiality and integrity. Authenticate and attribute all MANAGEMENT ACTIONS: M12: Client AUTHENTICATION for logging in, logging, and auditing on each NE/MS shall be at least as strong as a User ID with a COMPLEX PASSWORD over a previously established TRUSTED PATH. Manage security resources and configurations with integrity: M25: On each NE/MS, a SYSTEM SECURITY ADMINISTRATOR shall be able to execute all of the CRITICAL SECURITY MANAGEMENT ACTIONS. Maintain secure logs for all of the above: M31: Each NE/MS shall be able to log each CRITICAL SECURITY ADMINISTRATION ACTION, each login attempt and its result, and each logout or SESSION termination. 24

Link to the Draft Standard (T1.276) Final Working Document Number: T1M1.5/2003-007R5 Operations, Administration, Maintenance, and Provisioning Security Requirements for the Public Telecommunications Network: A Baseline of Security Requirements for the Management Plane New File (pre-archived) at: ftp://ftp.t1.org/t1m1/new-t1m1.5/3m150075.pdf Or, moved to archive at: ftp://ftp.t1.org/t1m1/m1.5/2003/3m150075.pdf 25