Layered Security Architecture
Layered Security Architecture
ITU-T Recommendation
X.805 Security Architecture for
Systems Providing End-to-End
Communications
2
Origin of the ITU-T Recommendation
X.805
ITU-T Recommendation X.805 Security architecture for
systems providing end‑to‑end communications had been
developed by ITU-T SG 17 (ITU-T Lead Study Group on
Telecommunication Security) and was published in October
2003.
The group has developed a set of the well-recognized
Recommendations on security. Among them are X.800 Series
of Recommendations on security and X.509 - Public-key and
Attribute Certificate Frameworks.
3
Three main issues that X.805
addresses
The security architecture addresses three essential issues:
1. What kind of protection is needed and against what threats?
2. What are the distinct types of network equipment and facility
groupings that need to be protected?
3. What are the distinct types of network activities that need to
be protected?
4
ITU-T X.800 Threat Model
(simplified)
X
1 - Destruction (an attack on availability):
Destruction of information and/or network
resources
Availability
• Ensure network elements, • Ensure identification and
services and application network use is kept private
available to legitimate users Privacy • Examples: NAT, encryption
• Examples: IDS/IPS, network
redundancy, BC/DR
Security
Destruction Corruption Removal Disclosure Interruption
Dimension
Access Control
Authentication
Non-Repudiation
Data Confidentiality
Communication Security
Data Integrity
Availability
Privacy
7
Security Layers
8
Three Security Layers
Applications Security
3 - Applications Security Layer:
THREATS
• Network-based applications accessed by
Services Security
Destruction end-users
Corruption
VULNERABILITIES
Removal
• Examples:
Disclosure – Web browsing
Vulnerabilities Can Exist
In Each Layer Infrastructure Security
Interruption – Directory assistance
ATTACKS – Email
– E-commerce
9
Example: Applying Security Layers to IP
Networks
Applying Security Layers to IP Networks
Infrastructure Security Layer
– Individual routers, servers
– Communication links
Services Security Layer
– Basic IP transport
– IP support services (e.g., AAA, DNS, DHCP)
– Value-added services: (e.g., VPN, VoIP, QoS)
Applications Security Layer
– Basic applications (e.g. FTP, web access)
– Fundamental applications (e.g., email)
– High-end applications (e.g., e-commerce, e-training)
10
Security Planes
11
Three Security Planes
Security Layers
Applications Security
THREATS 1 - End-User Security Plane:
Destruction
• Access and use of the network by the
Services Security Corruption customers for various purposes:
VULNERABILITIES
Removal – Basic connectivity/transport
Disclosure
– Value-added services (VPN, VoIP, etc.)
Vulnerabilities Can Exist Interruption
In Each Layer and Plane Infrastructure Security – Access to network-based applications
ATTACKS (e.g., email)
End User Security
13
ITU-T X.805: Security Architecture for Systems
Providing End-to-End Communications
Security Layers
Applications Security
THREATS
Communication Security
Access Management
Data Confidentiality
Integrity
Destruction
Non-repudiation
Authentication
Availability
Control
Corruption
Integrity
Privacy
VULNERABILITIES
Services Security
Removal
Data
Vulnerabilities Disclosure
Can Exist
In Each Interruption
Layer, Infrastructure Security
Plane ATTACKS
14
Modular Form of X.805
Infrastructur Applications
Services Layer
e Layer Layer
Management
Plane Module one Module four Module seven
Control/Signaling
Module two Module five Module eight
Plane
User Plane
Module three Module six Module Nine
Verify the identity of the person or device attempting to access end-user data that is transiting a network
Authentication element of communications link or is resident in an offline storage device.
Authentication techniques may be required as part of Access Control.
Provide a record identifying each individual or device that accessed end-user data that is transiting a network
Non-Repudiation element or communications link, or is resident in offline devices and that the action was performed. The
record is to be used as proof of access to end-user data.
Protect end-user data that is transiting a network element or communications link, or is resident in an offline
Data Confidentiality storage device against unauthorised access or viewing. Techniques used to address access control may
contribute to providing data confidentiality for end-user data.
Communication Ensure that end-user data that is transiting a network element or communications link is not diverted or
Security intercepted as it flows between the end points (without an authorised access)
www.lucent.com/security
Protect end-user data that is transiting a network element or communications link or is resident in offline
Data Integrity storage devices against unauthorised modification, deletion, creation and replication.
Ensure that access to end-user data resident in in offline storage devices by authorised personnel and devices
Availability cannot be denied.
Ensure that network elements do not provide information pertaining to the end-users network activities (eg.
Privacy Users geographic location, websites visited, content etc.) to unauthorised personnel.
16
Summary: X.805 Provides a Holistic
Approach to Network Security
Comprehensive, end-to-end network view of security
17
ITU-T Recommendation X.805 is a
Base for Security work in FGNGN
Security Capability WG
18
Acronyms
AAA Authentication, Authorization, Accounting L2TP Layer Two Tunneling Protocol
ACL Access Control List MPLS Multi-Protocol Label Switching
ATM Asynchronous Transfer Mod NAT Network Address Translation
BC Business Continuity OSPF Open Shortest Path First
BGP Border Gateway Protocol PIM Protocol-Independent Multicast
DHCP Dynamic Host Configuration Protocol PKI Public Key Infrastructure
DNS Domain Name Service POP Post Office Protocol
DR Disaster Recovery QoS Quality of Service
FCAPS Fault-management, Configuration, RIP Routing Information Protocol
Accounting, Performance, and Security RSVP Resource Reservation Setup Protocol
FTP File Transfer Protocol
RTP Real-time Transport Protocol
HTTP Hyper Text Transfer Protocol SIP Session Initiation Protocol
ICMP Internet Control Message Protocol
SMTP Simple Mail Transfer Protocol
IDS Intrusion Detection System SNMP Simple Network Management Protocol
IKE Internet Key Exchange protocol SS7 Signaling System 7
IM Instant Messaging
TCP Transmission Control Protocol
IMAP Internet Message Access Protocol TLS Transport Layer Security protocol
IPS Intrusion Prevention System
UDP User Datagram Protocol
IPsec IP security (set of protocols) VoIP Voice over IP
IS-IS Intermediate System-to-Intermediate System
VPN Virtual Private Network
(routing protocol)
19
Thank you!
20