Sie sind auf Seite 1von 64

ITU-T X.

805 Workshop
IMF 2007
Stuttgart, Germany
September 13, 2007
Suhasini Sabnis
Bell Labs Security Technology Application Research
Agenda
Security Drivers and Challenges
ITU-T X.805 Security Framework Overview
Using ITU-T X.805 for Security Assessment
Applying ITU-T X.805 A Case Study
Security Standards and Security Compliance
Questions

2 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Critical Market Concerns Security Drivers

Ensuring customer
privacy Identifying specific
Improving reliability
& service availability risks & quantifying
vulnerabilities

Defending against
Securing new increasingly
technologies & sophisticated attacks
applications
Managing limited
resources for
ongoing security
administration

A best-in-class company must cover people, process & tools

3 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
The Security Challenge

Security as an Opportunity Security as a Risk


Cost Reduction Business Risk
Optimize operations and Loss of Revenue

t i o an d
productivity
Customer Churn

ns
olu m
Compliancy costs

s l de
Lessons learned Regulatory

ied il
t if s w
SOX Compliancy

e r t ie
Revenue Increase EU privacy regulation

c ar
re e p
More competitive offering Protection of Critical Infrastructures

cu al
through ISO certification
se oles
Financial segment: BASEL II
Wh

Customer Satisfaction Customer Satisfaction


More reliable and protected Intrusion incidents Higher perceived
service delivery vulnerability

Increased brand image Reduced brand image

Security is a Process not a Product

4 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Becoming a Security Best-in-Class Company

Strong Information Security Organization


Unambiguous & up-to-date security policies Assess
& awareness
Identification of critical assets & risk
inventory
Adaptable information security

Manage
architecture

Design
Plan &
Testable business continuity program
Considers security in the design and
planning stage

Implement

Security is a continuous living process to ensure people, network,


& information have the necessary protection the businesses require for
secure, reliable day-to-day operations
5 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Primary Security Planning Considerations

1. What kind of protection is needed & against what threats?


2. What are the distinct types of network equipment & facility groupings
that need to be protected?
3. What are the distinct types of network activities that need to be
protected?

6 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Introducing the ITU-T X.805 Framework

The framework provides the system-level thinking essential for the next-
generation approach to security

Organizes amazing complexity into bite-sized requirements


Comprehensiveness assures all aspects considered
Common approach leads to shared understanding
Standardization essential to interoperability in multi-supplier networks

X.805 provides a framework for how complex networks can be


examined in a systematic manner for security considerations
7 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Global Standard ITU-T X.805, ISO/IEC 18028-2:
A Comprehensive Network Security Framework*

*A Bell Labs Breakthrough


Bell Labs Security Framework
ITU-T X.805/ ISO, IEC 18028-2 Standard

Applications Security
THREATS

Communication Security
Data Confidentiality
Confidentiality
Destruction

Non-repudiation
Control

Non-repudiation
Authentication
Access Control
Authentication

Data Integrity
Integrity

Availability
Availability
Services Security Corruption

Privacy
VULNERABILITIES

Privacy
Removal

Access

Data
Disclosure

Data
Vulnerabilities Interruption
can exist in Infrastructure Security
each:
Layer ATTACKS
Plane
End UserSecurity
End User Security
Security Control/SignalingSecurity
Control/Signaling Security
Security Dimensions
Planes ManagementSecurity
Management Security
Security Layers

8 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Threats*

* Defined by ITU-T X.800 (1991)


Security Architecture for Open Systems Interconnection for CCITT
Applications

THREATS Destruction of information and/or other resources


Destruction
Corruption or modification of information
Corruption

Removal Theft, removal or loss of information and/or other resources


Disclosure

Interruption
Disclosure of information

ATTACKS Interruption of services

9 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.800 Threat Model

1. Destruction:

X
Destruction of information &/or other network resources

Example: (1) Malicious destruction of network equipment

2. Corruption:

An unauthorized tampering with an asset

Examples: (1) Changing network configuration information

(2) Changing data as it is being transmitted across the network

3. Removal:

Theft, removal or loss of information &/or other resources

Examples: (1) Theft of a laptop or a confidential information

4. Disclosure:

An unauthorized access to an asset

Examples: (1) Unauthorized data capture (data sniffing)

(2) Discovery of unprotected WLAN access points


5. Interruption:

Network becomes unavailable or unusable

Examples: (1) Cutting of a communication facility

(2) Network denial of service attack


X
10 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805: Three Security Layers

Applications Security

1 - Infrastructure Security Layer:


Services Security Fundamental building blocks of
networks services & applications
Examples:
Individual routers, switches,
Infrastructure Security
servers
Point-to-point WAN links
Ethernet links
End UserSecurity
End User Security Application servers
Control/SignalingSecurity
Control/Signaling Security
ManagementSecurity
Management Security

Each Security Layer has unique vulnerabilities, threats


Infrastructure security enables services security enables applications security
11 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805: Three Security Layers

Applications Security

2 - Services Security Layer:


Services Security Services provided to end-users
Examples:
Frame Relay, ATM, IP
Infrastructure Security Cellular, Wi-Fi,
VoIP, QoS, IM, Location
services
Toll free call services
End UserSecurity
End User Security
Control/SignalingSecurity
Control/Signaling Security
ManagementSecurity
Management Security

Each Security Layer has unique vulnerabilities, threats


Infrastructure security enables services security enables applications security
12 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805: Three Security Layers

Applications Security

3 - Applications Security Layer:


Services Security Network-based applications
accessed by end-users
Examples:
Web browsing
Infrastructure Security
Directory assistance
Email
E-commerce
End UserSecurity
End User Security
Control/SignalingSecurity
Control/Signaling Security
ManagementSecurity
Management Security

Each Security Layer has unique vulnerabilities, threats


Infrastructure security enables services security enables applications security
13 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805: Three Security Planes

Applications Security

1 - End-User Security Plane:


Services Security
Access & use of the network by
the customers for various
purposes:
Infrastructure Security Basic connectivity/transport
Value-added services (VPN,
VoIP, etc.)
Access to network-based
End UserSecurity
End User Security applications (e.g., email)
Control/Signaling Security
Control/Signaling Security
Management Security
Management Security

Security Planes represent the types of activities that occur on a network


Each Security Plane is applied to every Security Layer to yield 9 security Perspectives (3 x 3)
Each security perspective has unique vulnerabilities & threats

14 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805: Three Security Planes

Applications Security

2 - Control/Signaling Security Plane:


Activities that enable efficient
Services Security functioning of the network
Machine-to-machine
communications
Examples:
Infrastructure Security
Call or session set up (e.g., Session
Initiation Protocol-SIP)
QoS signalling
End UserSecurity
End User Security
Real Time Protocol (RTP), Border
Control/Signaling Security
Control/Signaling Security
Gateway Protocol (BGP)
Management Security
Management Security

Security Planes represent the types of activities that occur on a network


Each Security Plane is applied to every Security Layer to yield 9 security Perspectives (3 x 3)
Each security perspective has unique vulnerabilities & threats

15 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805: Three Security Planes

Applications Security 3 - Management Security Plane:


Access and use of management &
provisioning activities of network elements,
services & applications by operators
Services Security Examples:
Network operations or management
Network elements
Infrastructure Security Transmission facilities
Back-office systems
Data centers
End UserSecurity
End User Security
Control/Signaling Security
Control/Signaling Security
Management Security
Management Security

Security Planes represent the types of activities that occur on a network


Each Security Plane is applied to every Security Layer to yield 9 security Perspectives (3 x 3)
Each security perspective has unique vulnerabilities & threats

16 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Example: Applying Security Planes to Network Protocols

End User Security Plane


Activities Protocols
End-user data transfer HTTP, RTP, POP, IMAP
End-user application TCP, UDP, FTP
interactions IPsec, TLS

Control/Signaling Security Plane


Activities Protocols
Update of routing/switching tables BGP, OSPF, IS-IS, RIP
Service initiation, control, and SIP, RSVP, H.323, SS7.
teardown IKE, ICMP
Application control PKI, DNS, DHCP, SMTP

Management Security Plane


Activities Protocols
Operations SNMP
Administration Telnet
Management FTP
Provisioning HTTP

17 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Using X.805 Layers/Planes
Asset Identification

Assets are identified based on the network architecture or design and the scope of
work that needs to be secured; e.g., what services, applications, etc. need to be
secured. It is an iterative process.

First step is to examine the X.805 Layers:

Infrastructure Layer: The underlying hardware, software platforms, data,


transmission facilities, etc. used by the service or application. Assets include
operating systems that are running as well as stored on disk, DBMS, etc.

Services Layer: The logical groupings of equipment, facilities, information that


comprise services required by the application. For example, in IPTV, IP multicast is a
service used by the Video-on-Demand application. Assets include multicast sources,
rendezvous points, group members, etc.

Applications Layer: Systems comprising the in-scope applications, the information


they generate and use, and information flows. Typically, the end-user directly
interacts with these systems. In IPTV, example application is Video-on-Demand.
Assets include video servers, MPEG content, video streams, etc.

18 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805 for Asset Identification continued

Second step is to use the X.805 Planes to uncover additional assets by examining
the activities that must be protected at the management, control and end-user
plane for each asset listed in the First step :

For example in an IPTV study, as part of examining IP multicast service control plane,
PIM and MSDP protocols are assets that need protecting. Likewise, IGMP protocol is
another asset as part of examining the IP multicast service management plane.
Examining the video stream control plane, identified DSM-CC and RTSP protocols as
assets that need protecting.

19 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Applying X.805 Asset Identification
Example 1: Internet Service Provider

Layer

Infrastructure Services Applications


Router VPN Email
RAS QoS Web Hosting
Web Servers VoIP

Management GUI User Provisioning

Management Command Line Interface SLA Configuration Provisioning user mailboxes

Remote Management Billing/Mediation

IPSec/PKI SMTP
Routing Tables
Control RSVP POP3
DNS Database
Plane

SIP HTTP

Access Space Data HTTP Traffic


End-User VoIP Traffic
Email Data User Credentials

20 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Example 2: Large Enterprise

Layer

Infrastructure Services Applications

Router VPN Order Processing

PBX VoIP NetMeeting

Enterprise Servers Directory Services SIP Client

Management GUI Managing Upgrades (Central


Provisioning Users
Management Command Line Interface Distribution)
Managing LDAP
Remote Management Configuration of SIP clients

IPSec/PKI
Routing Tables LDAP
Control SIP
DNS Database SIP
Plane

LDAP

Enterprise Hosted Data


VoIP Traffic NetMeeting Session
End-User Backup of End-user PCs
End-User information User Credentials
Voice Messages

21 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Access Control:
Authentication
Authentication
Ensures access by authorized
personnel & devices only
Non-repudiation
Non-repudiation
Protects against unauthorized use of
network resources
Data Confidentiality
Data Confidentiality
Mechanisms:
Simple log-in/password
Communication Security Access Control Lists (ACL)
Intrusion Detection Systems (IDS)
Data Integrity
Data Integrity In addition, Role Based Access Control
(RBAC) provides different levels of access
Availability
Availability control to guarantee that only authorized
individuals & devices can only access
information
Privacy
Privacy

22 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Authentication:
Authentication
Authentication Confirms the identity of
communicating entities (e.g., end-
Non-repudiation
Non-repudiation users, OA&M activity, network
elements)
Data Confidentiality
Data Confidentiality Ensures validity of claimed entities
Provide assurance that an entity is not
Communication Security masquerading
Mechanisms:
Data Integrity
Data Integrity Digital certificates
Digital Signatures
Availability
Availability SSL
SSO
Privacy
Privacy CHAP

23 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Authentication
Authentication Non-repudiation:
Prevents an individual or entity
Non-repudiation
Non-repudiation denying having performed an
unauthorized action
Data Confidentiality
Data Confidentiality Ensures availability of evidence that
can be presented to a third party, an
event/incident has taken place
Communication Security
Mechanisms:
Data Integrity
Data Integrity Logs
Role based access control
Availability
Availability Digital signatures

Privacy
Privacy

24 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Authentication
Authentication Data Confidentiality:
Protects data from unauthorized
Non-repudiation
Non-repudiation disclosure
Ensures data content cannot be
Data Confidentiality
Data Confidentiality
understood by unauthenticated
entities
Communication Security Mechanisms:
Encryption (3DES, AES)
Data Integrity
Data Integrity Access control lists
File permissions
Availability
Availability

Privacy
Privacy

25 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Authentication
Authentication Communication Security:
Ensures information only flows
Non-repudiation
Non-repudiation between the authorized end points
Ensures information is not diverted or
Data Confidentiality
Data Confidentiality intercepted as it flows between these
end points
Communication Security Mechanisms:
VPNs (IPSec, L2TP)
Data Integrity
Data Integrity MPLS tunnels
Private Lines
Availability
Availability Separate networks

Privacy
Privacy

26 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Authentication
Authentication Data Integrity:
Ensures the correctness or accuracy
Non-repudiation
Non-repudiation of information
Ensures data is protected from
Data Confidentiality
Data Confidentiality unauthorized modification, deletion,
creation & replication
Communication Security Provides an indication that this has
occurred
Data Integrity
Data Integrity Mechanisms:
IPSec HMACs (e.g. MD5, SHA-1)
Availability
Availability Cyclic redundancy checks
Anti-Virus Software
Privacy
Privacy

27 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Authentication
Authentication Availability:
Ensures no denial of authorized
Non-repudiation
Non-repudiation access to network elements, stored
information, information flows,
Data Confidentiality
Data Confidentiality
services, application
Disaster recovery solutions are
included in this category
Communication Security
Mechanisms:
Data Integrity
Data Integrity
Redundancy & back-up
DoS mechanisms
Availability
Availability Firewalls, IDS/IPS (for blocking DoS)
Business continuity
Privacy
Privacy Managed network & services with SLAs

28 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Dimensions
8 Security Dimensions Address the Breadth of Network Vulnerabilities

Access Control
Access Control

Authentication
Authentication

Non-repudiation
Privacy:
Non-repudiation
Provides protection of information that
Data Confidentiality
Data Confidentiality might be derived from network
activities
Mechanisms:
Communication Security
Proxies

Data Integrity
Integrity
Encryption of IP headers
Data
(for example: IPSec VPNs)
NAT
Availability
Availability

Privacy
Privacy

29 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Rationale for ITU-T X.805 Dimensions Relative to C-I-A

Authentication: Proving a person's identity (e.g., userID, password)


Access Control
Access Control
does not fit into confidentiality, integrity, availability.
Non-repudiation: Being able to unequivocally associate an entity with
Authentication
Authentication an action. Identifying the authorized person that performed an
unauthorized action on protected data has nothing to do with the data's
Non-repudiation
Non-repudiation confidentiality, integrity, availability.
Access control: Placing a lock on a door to prevent someone from
Data Confidentiality
Data Confidentiality entering a hazardous location has nothing to do with confidentiality,
integrity or availability.
Communication Security Privacy: Privacy recognizes the need to protect actions in addition to
information. Protecting information is addressed by confidentiality.
Data Integrity
Data Integrity Protecting the conversation in a phone call between Pat Russo and John
Chambers protects their confidentiality. Protecting the fact that Pat
Availability
Availability Russo and John Chambers had a phone call protects their privacy.
Communications Security: Protecting against call black-holing has
Privacy
Privacy nothing to do with confidentiality, integrity, availability.

30 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Applying Security Dimensions An Example
Layers

Infrastructure Services Applications

Management MODULE 1 MODULE 4 MODULE 7

Planes Control /
Signaling MODULE 2 MODULE 5 MODULE 8

End User MODULE 3 MODULE 6 MODULE 9

Access Control Non-Repudiation Comms Security Availability

Data
Authentication Confidentiality Data Integrity Privacy

Ensure that only authorized personnel can perform administrative/management activities


on the network device or communications link
Ensure that only authorized devices (e.g. in the case of SNMP managed devices) are
allowed access
Address both direct & remote management of device

31 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007 Slide 31
Applying Security Dimensions An Example
Layers

Infrastructure Services Applications

Management MODULE 1 MODULE 4 MODULE 7

Planes Control /
Signaling MODULE 2 MODULE 5 MODULE 8

End User MODULE 3 MODULE 6 MODULE 9

Access Control Non-Repudiation Comms Security Availability

Data
Authentication Confidentiality Data Integrity Privacy

Ensure that only authorized personnel & devices are allowed to


perform, or attempt to perform administrative or management activities
of the network service (e.g. provision users of the service)

32 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007 Slide 32
Applying Security Dimensions An Example
Layers

Infrastructure Services Applications

Management MODULE 1 MODULE 4 MODULE 7

Planes Control /
Signaling MODULE 2 MODULE 5 MODULE 8

End User MODULE 3 MODULE 6 MODULE 9

Access Control Non-Repudiation Comms Security Availability

Data
Authentication Confidentiality Data Integrity Privacy

Ensure that only authorized personnel & devices are allowed to perform,
or attempt to perform administrative or management activities of the
network-based application (e.g. administer user mailboxes for an email
application)

33 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007 Slide 33
VoCable Network Security Example Application of ITU-T X.805

Provisioning & Other OSS/


SNMP Mgmt DNS DHCP TFTP BSS
Signaling Signaling Application
Gateway Gateway Servers
SS7 Controller SYSLOG CALEA Telephony Record Keeping
Network KDC Server (RADIUS)
Call
Management
Server
Media
Gateway Operations Support, Business Support &
Controller Media Security Servers
Media Servers
Gateway Secure Control Plane

PSTN NCS call setup messages


containing Calling and
Called Numbers are
encrypted.
Insecure End-User Plane
(Privacy Dimension)
NoTraditional
end-to-end encryption of
Source, Managed IP Internet
voiceDestination IP addresses.
(Privacy Dimension)
customer Network

CMTS CMTS Headend


HFC HFC HFC
Access Access Access
Network- Network- IP Secure Network-
DOCSIS DOCSIS Header Payload DOCSIS
1.1 1.1 1.1
E-MTA E-MTA Impact E-MTA
Customer
Endpoints are visible. Premise
Insider Attack Vulnerabilities.

34 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Life Cycle Objectives
How ITU-T X.805 assets be leveraged

Systems architecture review board


Vulnerability audits: Interviews, tests, protocol analyses
Software robustness
Security tools setup

Assess Security policy


Security Awareness Prioritizing security
checklists roadmap (customer
Formalize internal requirements ,
Goal
& 3rd party patch Manage
architecture gaps etc)
Strengthen network,

Design
Plan &
management services & team to 3rd-party security gaps
Training ensure security Interoperability of 3rd
Process for adequately addressed
party
customer Reliability & security
communication test strategy
Incident response Secure coding
Implement

Product hardening
Security engineering guidelines for the customer
Technology deployment

35 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Role of Security Policy

Inputs Security Policy Key Benefits

Scope Products &


Business
Objectives &
Solutions
Technology Drives common security
Strategy guidelines
Build quantification of Consistent
security threats and Architecture Availability
associated risk Features Confidentiality
Existing Risk Data Integrity
Standards &
Handle Customer
quantification Access Control
Support Services Track the
Customer Non-repudiation
Requirements
Guidelines for Incident quality of Authentication
Response Security Privacy
ITU-T X.805, 3GPP,
3GGP2, TIA, etc
Critical security Communications
references

3rd Party
Agreements

36 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Industry

Bringing the Elements


Business Leadership
Continuity/ Professional
Standards
Disaster Recovery Services

of ITU-T X.805 Together


For
Product
Reliability
Threat Assessment Bell Labs
Models and
Tools

Incident
Response
Coordination

Govt. Internet
Research Lab

37 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
High Level Key Definitions

Threats (Threat Scenarios)


An unwanted (deliberate or accidental) event that may result in harm to a
business, institution or individual.
Any circumstance or event with the potential to adversely impact a business,
institution or individual.
An indication or source of impending danger, declaration of intent to harm a
business, institution or individual.
Adversarial attack or inadvertent error that causes damage to a business,
institution or individual.

X.800 Threat Classes (Corruption, Destruction, Theft/Removal, Disclosure,


Interruption)
Threat classes are applicable to individual assets. For example, a customer billing
record is subject to corruption, destruction, theft/removal, disclosure,
interruption

38 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Relationship of Threat Classes and Threat Scenarios

The threat classes contained in the threat model are fixed regardless of what
technology and industry vertical the threat model is applied to.
A Threat Scenario is realized by a combination of threat classes (threats) on a
set of assets. For example, Invasion of Subscriber Privacy can be realized by:
Disclosure on the air interface asset,
Disclosure of the call detail record asset,
Disclosure of the customer billing record asset,
Example of the application of a threat class (threat) to an asset:
Threat Scenario: Invasion of Subscriber Privacy
Asset: Radio Air Interface
Disclosure Threat Class: Sniffing devices can be used to eavesdrop on
subscriber conversations.
Vulnerability: EV-DO air interface is not encrypted.
Countermeasure: Employ encryption at a higher protocol layer (e.g.,
TLS/SSL, IPsec).

39 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
High Level X.805-based Methodology for Threat Assessment

X.805 Asset
Data Collection and Background

Identification

X.805 Threat Analysis


Research

X.805 Vulnerability
Analysis

Countermeasures and
Recommendations

40 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805 Asset

Data Collection and Background


Identification

Research
X.805 Threat Analysis
Data Collection & Background Research
X.805 Vulnerability
Analysis

Countermeasures and
Authentication Server
Recommendations
DHCPServer

Ethernet LAN Enterprise/Service

Internal
Provider Network

Mobile Station Access Point DNSServer


Network
Documents Architecture
Network Access
Controller

Application Servers

Industry Priority Threat Scenario

Fora Threats 1. Request Flooding


2. Malformed Requests & Messages
3. Theft of Service
4. Unauthorized Network Scans & Probes
5. Eavesdropping

Vulnerability DBs

Known
Vulnerabilities

Standards Orgs.
Known
Countermeasures

41 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805 Asset

Data Collection and Background


Identification

X.805 Security Analysis Process


X.805 Threat Analysis
Research

X.805 Vulnerability
Analysis

ers,
Applications Security
Countermeasures and THREATS

Communication Security
Recommendations
5L a

Data Confidentiality
Confidentiality
Destruction

Non-repudiation
Control
X.80 lanes

Non-repudiation
Authentication
Access Control

Integrity
Authentication

Data Integrity

Availability
Availability
Services Security Corruption

Privacy
VULNERABILITIES

Privacy
Removal

Step 2: Perform X.805 Asset Identification P

Access
p

Data
Disclosure

Data
Vulnerabilities Interruption
Infrastructure Security
Management Control End-User can exist in
each:
Layer
Asset Plane Plane Plane Plane
ATTACKS

IGMPv2/v3 Dimension
End User
UserSecurity
Security
Network 1.1
(Snooping) Security
Planes
Control/Signaling
ManagementSecurity
Management Security
Security
Control/Signaling Security
Security Dimensions
PIM (SM, SSM,
Architecture 1.2
Snooping) Security Layers

s
at
1.3 MBGP

r e
Th

ns
5
80

sio
X.
Perform X.805 Threat Analysis

en
Threat

im
Services Layer Threat Exposures (1) Scenarios

5D
S-1. A Interface
Threats+ Corruption:
Forged or altered messages 1,2,4,8

80
Malformed packets 7

X.
Replayed packets 2,3

+ indicates that there


is additional analysis
Perform
p X.805 Vulnerability Analysis
y y
Services Layer Threat
Asset Details Services Layer Vulnerability Analysis
Known 1.1 IGMPv2/v3
Malformed IGMP packets could be created by
Vulnerabilities+ Malformed IGMP an attacker and sent to the DSLAM or STB.
Corruption
packets Malformed packets could cause buffer
overflow or the system to hang/crash.

Countermeasures and Recommendations


Asset Services Layer Threat Details Countermeasures
1.1 IGMPv2/v3
Known To protect against malformed IGMP packets:
1. Verify DSLAM or STB device manufacturer follows

Countermeasures+ Corruption Malformed IGMP packets best practices for secure software development.
2. Include security testing during DSLAM or STB
acceptance testing.

42 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
WLAN Reference Architecture

Authentication
Server
DHCP
Server

Ethernet LAN Enterprise/Service


Provider Network
Mobile Station Access Point
Network
DNS Server
Access
Controller

Access Point
Mobile Station
Application Servers

43 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
WLAN Network Security Domains

Sample focus is on Domain 2 for


wireless access service

Authentication
Server
DHCP
Server

Ethernet LAN Enterprise/Service


Provider Network
Mobile Access Point
Network DNS Server
Station
Access
Controller

Access Point
Mobile Application Servers
Station Security
Domain 2
Security
Domain 1
44 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805 Asset Identification -
Sample Asset Inventory

Infrastructure Layer Services Layer Applications

Access Point (AP) Wireless Access Layer

Management AP GUI Provisioning a user (e.g.,


Plane MAC address in AP)
AP management
traffic

Control/Signaling Association table in Authentication traffic


Plane AP
802.11a/b/g

DHCP traffic

User Plane User traffic between MS


and AP

45 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
WLAN Reference Architecture
Sample Threats

Compromise of AP Admin/Management
Data:
DHCP Server Authentication
Server

Ethernet LAN Enterprise/Service


Provider Network
Mobile Station Access Point
Network
DNS Server
Access
Controller

Access Point
Mobile Station
Application Servers

Compromise of Wireless Coverage

46 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805 Threat Analysis

Asset Destruction Corruption Removal Disclosure Interruption Threat


Scenario
GUI of all NEs N/A N/A N/A Unauthorized Consuming processing
access resources (DoS)
1
AP Management N/A Forged Redirecting Eavesdropping Consuming processing
Traffic management messages to (SNMP v1 and v2) resources (DoS)
commands another address 1
Association table in Unauthorized N/A N/A Gathering N/A
AP access to AP, information about
software clients (depending
backdoors, buffer on what is stored)
overruns 1
User traffic between N/A Session hijacking Evil twin No encryption RF jamming
MS and AP Man in the middle Key cracking Data flooding
attack 2
Authentication N/A N/A N/A Shared, static key Data flooding
handshake common across all
clients
key stored in clear
text
2
802.11a/b/g N/A Session hijacking Evil twin No encryption RF jamming
Man in the middle Data flooding
attack 2

Threats:

1. Compromise of administrative and management data


2. Compromise of wireless coverage

47 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Threat Analysis Summary

ISO 18028-2 Threat Exposure


Removal Covered in
Asset Destruction Corruption or Theft Disclosure Interruption Threat
1. AP GUI X X 1
2. AP Management Traffic X X X X 1
3. Association Table in AP X X 1
4. User traffic between MS and X X X X 2
AP
5. Authentication Traffic X X 2
6. 802.11a/b/g X X X X 2

Threats:

1. Compromise of administrative and management data

2. Compromise of wireless coverage

48 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
X.805 Vulnerability Analysis
-Sample illustration

Asset/Threat Analysis
1. AP GUI

Disclosure Use of HTTP for web-based access

Interruption Physical access of AP or password compromise

2. AP Management Traffic

Corruption Forged management commands (protocol weakness)

Removal Spoofed ARP Response (low probability vulnerability)

Disclosure Eavesdropping (SNMP v1, v2)

Interruption DoS attack on the management port of the AP

3. Association Table in AP
Weak access control, lack of software integrity
Destruction

Disclosure

49 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Countermeasures and Recommendations
-Sample illustration

Asset/Threat
Analysis Countermeasures
1. AP GUI - Use secure HTTP (HTTPS). Password protection best
Use of HTTP for web-based practices. If AP does not support https, then use secure VPN
Disclosure access using an additional VPN gateway.

Interruption Physical access of AP or - Physical access to the AP should be limited and protected by
password compromise using site surveillance

2. AP
Management Forged management -Since the AP is primarily a bridge device, the management
Traffic commands (protocol port for the AP can be on a separate subnet (assign it a
weakness) different network from the users) Use ACLs to control access.
Corruption
Spoofed ARP Response (low - Encryption of the community string while in-transit forces
Removal probability vulnerability) the attacker to know the encryption key in addition to
successfully guessing the password in order to gain access.
Disclosure Eavesdropping (SNMP v1, v2) SNMPv3 should be configured with community string
encryption enabled.
Interruption DoS attack on the
management port of the AP

3. Association
Table in AP
-Change default AP configuration, such as SSID
Weak access control, lack of
-Disable SSID broadcasts
Destruction software integrity
-Software integrity checks
Disclosure

50 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Industry
Business Leadership
Continuity/ Professional
Standards
Disaster Recovery Services

ITU-T X.805 and Other


Product
Reliability
Standards Bell Labs
Models and
Tools

Incident
Response
Coordination

Govt. Internet
Research Lab

51 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Standardization Issues

Key Distribution (for end-users and network elements) and Public Key Infrastructure

Network Privacy topology hiding and NAT/Firewall traversal for real-time applications

Convergence with IT security

Management of security functions (e.g. policy)

Guidelines on the implementation of the IETF protocols (e.g. IPSec options)

Security for supporting access: DSL, WLAN, and cable access scenarios

Guidelines for handling 3GPP vs. 3GPP2 differences in IMS security

Both network assets and network traffic must be protected.


Proper management procedures will prevent attacks from within

52 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Regulatory Compliance

The ISO 17799/ISO 27002 standard prepares organizations for industry specific regulations
and standards:
Financial: BASEL II; GLBA
Health Care: eHealth; HIPAA
Government: CSE;

Financial Government Health Care Other

A common framework to
Sarbanes Oxley adapt to emerging
ISO 17799 to be ISO 27002 industry requirements
ITU-T X.805 / ISO 18028-2
HIPAA Health Insurance Portability and Accountability Act
GLBA Gramm-Leach Bliley Act
CSE - Communications Security Establishment

Standards approach provides foundation

53 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Framework

Information Systems Management Security under ISO 27001/ISO 27002 umbrella


Risk management Ongoing process to establish current exposure in monetary terms
ISO 27001 ISO 27002 Definition of high level security policy articulating business
Policy

Regulatory requirements
objectives

SOx 404 requirements


Implementation of a security forum with reps from
Organization different areas
Comprehensive view over all critical assets, along with
Asset management exposure and value
HR related controls to ensure only authorized personnel
Human Resources security are allowed
ISMS Controls, Processes
PhysicalMethods
& Environmental Security measures required to protect the critical assets
specification & Procedures
Comms & Ops management Security controls for all networking components
Mechanisms to ensure appropriate access controls across
Access Control all elements
Definition of software developments requirements for all
Software Development
ISO elements
Certification Incident Management Implementation of an incident response process and team
Definition & implementation of bus continuity & disaster
Business Continuity recovery plans
Establishing compliance against all required regulations &
Compliance standards

Product level Security Network level security


ITU-T X.805 /
ISO 15408
ISO/IEC 18028-2

Common 8-2 Network controls &


1 802
Criteria IS O Methodology

54 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Synergy Between ISO/IEC 27001:27005 & ITU-T X.805 / ISO,IEC 18028-2

The combination of ITU-T X.805 / ISO/IEC 18028-2 and ISO 27000 address business, and
technical risks associated with information and network security

ISO/IEC 27001:27005 ITU-T X.805/ ISO,IEC 18028-2


Provides standards for Provides standards for
implementing, maintaining and detailed technical design,
improving an Information architecture, requirements,
Security Management System and test plans for the end-to-
to manage risk within the end network security
context of an organizations solutions or individual
overall business environment. products
Applications Security
THREATS

Communication Security
Data Confidentiality
Confidentiality
Destruction

Non-repudiation
Control

Non-repudiation
Authentication
Access Control

Integrity
Authentication

Data Integrity

Availability
Availability
Services Security Corruption

Privacy
VULNERABILITIES

Privacy
Removal

Access

Data
Disclosure

Data
Vulnerabilities Interruption
can exist in Infrastructure Security
each:
Layer ATTACKS
Plane
Dimension
End UserSecurity
End User Security

Security Control/Signaling Security


Control/Signaling Security
Security Dimensions
Planes ManagementSecurity
Management Security
Security Layers

ISMS = Information Security


Management Systems

55 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
ISO/IEC 27001 enhanced by ITU-T X.805 / ISO 18028-2

ISO/IEC 27001:2005 Controls


Specify acceptable use policy Restrict access to
Security Policy Access Control
for equipment. privileged information /
Sub-controls: Access control, applications to ensure
Authentication, Non-repudiation Organizing service continuity.
Information
Information Systems Sub-Controls: Authentication,
Security Acquisition, Access Control, Non-
Development & repudiation
Maintenance
Asset Mgmt
Harden network element Information Security
or system before Incident
Human Management
deployment. Resources Maintain security of
Sub-Controls: Access Security stored information.
control, Availability
Sub-Controls: Access
Physical &
Environment Business Continuity control, Confidentiality,
Security Management Integrity, Availability, Non-
repudiation

Communications &
Ops Mgmt
Compliance

56 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Security Implementation in Health Sector

eHealth or Health Insurance Portability and Accountability Act (HIPAA)


Privacy & Cyber Security Requirements
What:
Security of individually identifiable health information in electronic form
referred to as Electronic Protected Health Information (ePHI)
Who:
Healthcare providers, health care clearinghouses, health plan providers who
transmit any protected health information in electronic form

How:
By maintaining reasonable and appropriate administrative, physical, and technical
safeguards to protect against any threats to the security and integrity of ePHI

Why:
To protect confidentiality, integrity and availability of ePHI when it is stored,
maintained or transmitted.

57 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Utilizing ITU-T X.805 for Security Safeguards in Health Sector

End-users are:
Plan Provider ITU-T X.805 Safeguards in depth
Clearinghouse
Caregiver
Privacy -
Securing the patient data IPSec VPNs
Electronic provided to the network-based HIPAA Safeguards
Protected Health Information Access Control
(ePHI)
application (social security Communications Security -
Unique User Identification
number etc.) Emergency Access Procedure Use VPNs

Applications Security Encryption and Decryption


Application Security Data Confidentiality -
Automatic Logoff
Medical Records SSL/TLS for end-to-end
Audit Control application security
(logging and monitoring)
End User Security Non - Repudiation -
Integrity Digital Signatures
(Integrity of ePHI)
Infrastructure Security
Infrastructure Security
Person or Entity Authentication Data Integrity -
Enterprise Data Center Protect files w/ checksums
Transmission Security
Message Integrity Controls Data Confidentiality -
X.805 can be leveraged to Identify Encryption Controls
End User Security Encrypt files
Cyber Security Requirements of
eHealth/HIPAA Securing the patient data as it Access Control -
resides in or is transported through Use file system ACLs
network elements and while it is
being transported across End-users are IT for: Non - Repudiation
communications links. (medical Batch Transfers for Billing Role Based Access Control
history) Mirrored Backup
Disposal

58 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Regulatory Compliance & Network Security

Example: Sarbanes-Oxley Section 404


Management Assessment of Internal Controls
Management must establish effective internal controls for accurate & complete reporting
Annual assessment by management of the effectiveness of internal controls supported
by documented evidence
Validation of managements assessment by a registered public accounting firm

Systems, data & infrastructure components are


critical to the financial reporting process.

Enablers for Reliable Financial Reporting


Information management & data classification
Network Security
Information security (access control, authentication,
Requirements
identity management, cryptography, etc.)
Real-time reporting & audit logs
Data processing integrity & validation

Need comprehensive end-to-end network security analysis


59 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Standards Summary

Using ITU T X.805/ISO 18028-2 as your overall network security model will

Drive common security policies & requirements for your customer service
offerings
Build in quantification of security threats and associated risk
Ensure security is built in from service concept through deployment.
Continue to drive the end-to-end network security

60 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Using ITU-T X.805 for Measuring Security
Release n
Release n
Release n+1

Access Control
Access Control
Privacy Authentication Privacy Authentication

Availability Non_Repudiation Availability Non_Repudiation

Integrity Confidentiality Integrity Confidentiality

Comm Security Comm Security

View of a single product release Comparison of two releases of a product

Access Control

Privacy Authentication Low Risk Exposure


Medium Risk Exposure
High Risk Exposure
Availability Non_Repudiation
Release n
Release n+1
Integrity Confidentiality

Comm Security

61 | X.805 Training | April 2007


Risk exposure view of product releases
All Rights Reserved Alcatel-Lucent 2006, 2007
Conclusion

Business Imperatives Security Drivers End-User Needs

Minimize Maintain peak efficiency and effectiveness by


Conduct
Downtime & protecting your staff and data from threats business
Enhance quickly recognizing and mitigating security incidents anytime
Productivity more efficiently managing your network and security

Provide highly-available, quality services by


Provide Protected
controlling the impact of attacks on customer data
trustworthy personal
maintaining regulatory compliance to enable operation information
service alleviating privacy concerns

Control risks while managing costs by Secure services


Operate
relying on proven, best-in-class solutions now at a
cost- competitive
leveraging external capabilities and staff
effectively price
avoiding losses, liability, and fines

Create a business that can evolve securely by Seamless, fast


Build for encouraging customer loyalty via a secure reputation evolution to hot
the future ensuring on-going reliability and availability new features
allowing for smooth migration to new technologies

62 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
Backup

63 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007
What ITU T X.805 is Not by Itself?

One Answer to Architecture


May be just a talking point slide
Implementation Specification
A set of Organizational Controls
A Procedure or Specification of Evaluation Criteria
Implementation of Risk Management
A Protocol Verification Algorithm
Operations Management Guide
Organizational or Personnel Management Guide
Physical Security Standard
Product or Technology or Industry Dependent

X.805 can be used as an enabler for any of the items and more

64 | X.805 Training | April 2007 All Rights Reserved Alcatel-Lucent 2006, 2007

Das könnte Ihnen auch gefallen