Internet DRAFT - draft-chen-atomized-security-functions

draft-chen-atomized-security-functions







Internet Engineering Task Force                                Chen, Ed.
Internet-Draft                                                     L. Su
Intended status: Informational                              China Mobile
Expires: 11 April 2023                                    8 October 2022


      the Description and Definition for Atomic Security Functions
               draft-chen-atomized-security-functions-00

Abstract

   At present, many security products are deployed in the network, and
   the security functions of security products overlap.  Atomized
   security function refers to the smallest representation unit of
   security function, which cannot be split again and can be implemented
   by independent code.  Atomized security functions can quickly and
   effectively assemble security capabilities and provide security
   services.  It no longer takes security products as the unit, but
   atomic security functions as the basic unit, by reorganize and define
   the security functions supported by existing network devices then
   provide guidance for secure routing, finally, each security function
   will be uniformly coded.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 11 April 2023.

Copyright Notice

   Copyright (c) 2022 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.



Chen & Su                 Expires 11 April 2023                 [Page 1]

Internet-Draft             Security Functions               October 2022


   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Security functions  . . . . . . . . . . . . . . . . . . . . .   3
     2.1.  Identity  . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.2.  Protect . . . . . . . . . . . . . . . . . . . . . . . . .   3
     2.3.  Detect  . . . . . . . . . . . . . . . . . . . . . . . . .   5
     2.4.  Respond . . . . . . . . . . . . . . . . . . . . . . . . .   5
     2.5.  Recover . . . . . . . . . . . . . . . . . . . . . . . . .   6
   3.  Yang Model for Atomic security functions  . . . . . . . . . .   6
   4.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   6
   5.  Security Considerations . . . . . . . . . . . . . . . . . . .   6
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   6

1.  Introduction

   At present, there are many security companies and products on the
   market, the most common include firewall, vulnerability scanning
   system, intrusion detection system, intrusion prevention system, WEB
   application firewall, VPN, anti DDoS equipment.

   The equipment purchased by telecom operators takes security products
   as the basic unit to ensure the availability of the whole network;
   With the development of the network and the security transmission
   requirements of users, in addition to the availability of the
   network, it is also necessary to provide external security
   capabilities.  The availability of the basic network has been in a
   stable state, but the ability to provide external security needs to
   be improved.

   Atomic security functions: it refers to the smallest unit that
   independently provides security capability in code implementation.
   The definition and classification of atomization security
   capabilities are based on IPDRR, IPDRR is the network security
   framework of the National Institute of Standards and Technology.
   Identify, protect, detect, respond, and recover (IPDRR) are the 5
   high level functions of the framework core, there are 23 categories
   that are spread across these 5 functions.  When different from the 23
   categories, the definition and classification of atomic security
   capabilities start from the actual security products and aim at
   providing external security capabilities.




Chen & Su                 Expires 11 April 2023                 [Page 2]

Internet-Draft             Security Functions               October 2022


2.  Security functions

   At present, we refer to the IPDRR model to classify the capabilities
   of existing security products into 23 security capability categories.
   Of course, the fine granularity of this classification is not yet
   atomicized.  We will atomicize the 23 security capability
   classifications and reflect them in Yang's model.

2.1.  Identity

   Asset identification: through active detection and passive
   monitoring, identify the assets in the organization or network and
   their status changes, distinguish and classify their value and
   vulnerability in information security, and ensure the accuracy, real-
   time and consistency of assets.  Typical products include asset
   management system, asset exploration platform, etc.

   Identity identification: identify and verify the identity of visitors
   to networks, systems, applications, etc. to establish trust in their
   identity, and find unauthorized behaviors that do not conform to
   their identity.  Typical products include identification.

   Threat intelligence identification: identify the threat intelligence
   related to strategy, tactics and operations according to the rules or
   methods of threat intelligence identification.  Typical products
   include advanced continuous threat detection products.

   Vulnerability identification: use appropriate vulnerability scanning
   tools, or organize penetration testing or vulnerability evaluation,
   to scan and identify possible security vulnerabilities in equipment
   and software, classify vulnerabilities, and verify whether
   vulnerability repair is successful.  Typical products include
   vulnerability scanning systems.

   Configuration vulnerability detection: use configuration verification
   tools to scan and identify possible configuration vulnerabilities in
   equipment and software, so as to find and timely repair configuration
   problems.  Typical security products include configuration
   verification system, configuration verification, etc

2.2.  Protect

   Access control: through information security level and information
   classification, restrict privileged access, complete the separation
   of access control functions (such as access request, access
   authorization, access management) and the management of authorization
   and authority of access request, and make it only access authorized
   networks, terminals and other resources to prevent unauthorized



Chen & Su                 Expires 11 April 2023                 [Page 3]

Internet-Draft             Security Functions               October 2022


   access.  Typical products include firewalls, bastion computers,
   operation and maintenance security gateways, etc.

   Security interface protection: set interface security call
   conditions, disable or restrict unnecessary functions and interfaces.
   Typical products include baseline configuration check products.

   Encryption protection: provide password management, password
   operation and other password functions to provide confidentiality,
   tamper resistance, and non repudiation protection for files,
   communication links, etc.  Typical products include cryptographic
   devices, commercial encryptors, encryption cards, and public key
   infrastructure.

   Malware protection: use black and white list to prevent unauthorized
   software use.  Typical products include anti-virus products.

   Isolated exchange: by cutting off the network connection and
   stripping the network protocol, the data is ferried between different
   networks in the form of proprietary data blocks to achieve data
   exchange in a network isolated environment.  Typical products include
   gateways, security isolation and information exchange systems.

   Flow control: monitor network flow, limit bandwidth, filter messages
   and other operations, optimize the use of loan resources, and avoid
   network congestion.  Typical products include Web application
   firewall, Web application security protection system, anti DDoS
   attack, etc

   Data desensitization: based on desensitization rules such as data
   masking, data simulation, replacement of key parts, and random
   replacement of data, the sensitive data is transformed to achieve
   data hiding, deformation, and fuzziness.  At the same time, the
   desensitized data can maintain the original semantics and association
   relationships, and ensure the validity of the data while preventing
   the leakage of model sensitive information.  Typical products include
   data desensitization, etc

   Active defense: hide real assets or lure attackers to attack virtual
   targets through simulation, dynamic or static permutation and
   combination, deformation, transformation or confusion to achieve the
   security protection of real assets.  Typical products include
   honeypot, deception defense, pseudo security products, mobile target
   defense products, etc.

   Security environment support: Follow specific security policies in
   the design, implementation and use phases to provide a trusted
   computing module, a secure operating system and other security



Chen & Su                 Expires 11 April 2023                 [Page 4]

Internet-Draft             Security Functions               October 2022


   environments or enhance environment security.  Typical products
   include secure operating systems, secure databases, trusted execution
   environments, etc

   Residual information protection: Completely destroy the bearing data
   to be deleted on the storage media through overwriting, isolation,
   etc., to prevent the data leakage caused by unauthorized recovery of
   the deleted sensitive data, and to ensure that other data are not
   affected.  Typical products include data clearing, etc

2.3.  Detect

   Security monitoring: Collect and gather information such as network
   traffic, terminal information, online behavior, email information,
   and network assets, and provide on-demand or continuous monitoring.
   Typical products include network activity monitoring, etc.

   security analysis: analyze the network traffic, network behavior,
   terminal behavior, logs and other data with a reproducible and
   descriptive method, find out the abnormal and threatening behaviors,
   and determine the attack means and evaluate the attack loss.  Typical
   products include public opinion analysis, security detection
   analysis, intrusion detection system, etc.

   Security audit: identify, record, store and analyze information
   related to security activities, so that the organization can know
   whether its security activities meet the requirements of security
   compliance, and at the same time, it can help the organization fully
   understand and master the effectiveness, adequacy and suitability of
   its security activities.  Typical security products include code
   audit, log audit, behavior audit, flow audit, comprehensive audit,
   etc.

   system risk assessment: provide semi-automatic or automatic risk
   assessment for the system, with the purpose of improving system
   security.  Typical security products include system risk assessment
   services.

2.4.  Respond

   Security orchestration: Integrate third-party tools across security
   and business ecosystems through scripts to achieve triage and
   coordination of security events and collaborative response to
   security events.  Typical security products include security
   orchestration and automated response.






Chen & Su                 Expires 11 April 2023                 [Page 5]

Internet-Draft             Security Functions               October 2022


   Attack mitigation: for viruses, trojans, worms, network attacks, data
   leaks, e-mail attacks and other events, use alarm, anti-virus,
   process termination and other means to block, limit or pull the
   attackers or leak sources, so as to mitigate the expansion of events,
   reduce and eliminate the impact.

   Attack traceability: for general exceptions in the network system,
   security events without results, and security events with clear
   results (leakage, destruction) after serious damage, trace the source
   of infection, infection path, infection object and other information
   of tampering, destruction, latency and other attacks.

2.5.  Recover

   Backup and recovery: In order to cope with unexpected situations such
   as loss or damage of files and data, two or more sets of systems with
   the same functions can be established for files and data copies
   exported from the original system and stored separately.  Health
   status monitoring and function switching can be performed between
   them.  When one system stops working unexpectedly, it can be switched
   to another system to ensure that all functions and services of the
   system are normal.  It can be divided into data backup and recovery,
   website backup and recovery, disaster recovery auxiliary support,
   configuration rollback, etc.

3.  Yang Model for Atomic security functions

   TBD

4.  IANA Considerations

   This memo includes no request to IANA.

5.  Security Considerations

   TBD

Authors' Addresses

   Meiling Chen (editor)
   China Mobile
   BeiJing
   China
   Email: chenmeiling@chinamobile.com







Chen & Su                 Expires 11 April 2023                 [Page 6]

Internet-Draft             Security Functions               October 2022


   Li Su
   China Mobile
   BeiJing
   China
   Email: suli@chinamobile.com














































Chen & Su                 Expires 11 April 2023                 [Page 7]