ETSI GS INS 009-2012 Identity and access management for Networks and Services (INS) Security and privacy requirements for collaborative cross domain network monitoring (V1 1 1)《网络和.pdf
《ETSI GS INS 009-2012 Identity and access management for Networks and Services (INS) Security and privacy requirements for collaborative cross domain network monitoring (V1 1 1)《网络和.pdf》由会员分享,可在线阅读,更多相关《ETSI GS INS 009-2012 Identity and access management for Networks and Services (INS) Security and privacy requirements for collaborative cross domain network monitoring (V1 1 1)《网络和.pdf(25页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI GS INS 009 V1.1.1 (2012-09) Identity and access management for Networks and Services (INS); Security and privacy requirements for collaborative cross domain network monitoring Disclaimer This document has been produced and approved by the Identity and access management for Networks and Service
2、s ETSI Industry Specification Group (ISG) and represents the views of those members who participated in this ISG. It does not necessarily represent the views of the entire ETSI membership. Group Specification ETSI ETSI GS INS 009 V1.1.1 (2012-09) 2Reference DGS/INS-009 Keywords access control, data
3、sharing, multi-party computation, network monitoring, policies, policy management, privacy, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sou
4、s-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between s
5、uch versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subj
6、ect to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETS
7、I_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2012. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ET
8、SI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI GS INS 009
9、 V1.1.1 (2012-09) 3Contents Intellectual Property Rights 5g3Foreword . 5g3Introduction 5g31 Scope 6g32 References 6g32.1 Normative references . 6g32.2 Informative references 6g33 Abbreviations . 9g34 Scenario description and basic concepts 9g34.1 Cooperative incident handling by network operators .
10、10g34.2 Cooperative incident handling among enterprises 11g34.3 Cooperative anomaly and misuse detection . 11g35 Sharing schemes used in cooperative incident handling 11g35.1 Annotated Sharing Schemes . 12g35.2 Trusted-Third-Party Sharing Schemes . 13g35.3 Secure Sharing Schemes 13g36 Requirements 1
11、4g36.1 Business requirements 14g36.1.1 Confidentiality of business-sensitive data . 14g36.1.2 Impact on network operations . 14g36.1.2.1 Roles . 14g36.1.2.2 Same domain operations . 14g36.1.2.3 Cross-domain operations. 14g36.1.2.4 Legacy systems . 15g36.2 Regulatory requirements 15g36.2.1 Lawfulness
12、 of data processing 15g36.2.2 Purposes for which data are processed . 15g36.2.3 Necessity, adequacy and proportionality of the data processed 15g36.2.4 Quality of the data processed 15g36.2.5 Minimal use of personal identification data 15g36.2.6 Storage of personal data 15g36.2.7 Data retention 15g3
13、6.2.8 Access limitation 16g36.2.9 Information to and rights of the data subject 16g36.2.10 Consent of the data subject . 16g36.2.11 Data security measures . 16g36.2.12 Special categories of data . 16g36.2.13 Coordination with competent Data Protection Authority . 16g36.2.14 Supervision and sanctions
14、 . 16g36.2.15 Communications confidentiality . 17g36.2.16 Dissemination of data to third parties . 17g36.2.17 Transfer of data to third countries . 17g36.2.18 Flexibility and adaptability of legal compliance provisions . 17g36.3 Technical requirements 17g36.3.1 Privacy requirements 17g36.3.1.1 Purpo
15、se specification and binding . 17g36.3.1.2 Necessity, adequacy and proportionality . 18g36.3.1.3 Cooperation with third parties . 18g36.3.1.4 Complementary actions . 18g36.3.1.5 Data storage and retention . 18g36.3.1.6 Data protection mechanisms . 18g36.3.1.7 Access control . 19g3ETSI ETSI GS INS 00
16、9 V1.1.1 (2012-09) 46.3.1.8 Semantics 19g36.3.2 Security requirements . 19g36.3.2.1 Confidentiality 19g36.3.2.2 Integrity . 19g36.3.2.3 Availability 19g36.3.2.4 Backup 19g36.3.2.5 Access audit logs . 19g36.3.2.6 Network Segmentation 20g37 Available solutions and gaps 20g37.1 Incident information sha
17、ring (IETF INCH and MILE) 20g37.1.1 The Incident Object Description Exchange Format - IODEF . 20g37.1.2 Real-time Inter-network Defense RID . 21g37.1.3 Applicability to collaborative cross-domain network monitoring 21g37.2 Access Control . 21g37.3 Secure multiparty computation and other cryptographi
18、c approaches . 23g38 Conclusion 23g3Annex A (informative): Authors Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/ipr.etsi.org). Pursuant to the ETSI IP
19、R Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword Thi
20、s Group Specification (GS) has been produced by ETSI Industry Specification (ISG) Identity and access management for Networks and Services (INS). Introduction The threat landscape of todays Internet is characterized by highly distributed attacks (e.g. botnets) which leverage and target multiple doma
21、ins. Attackers do not care about boundaries between networks and jurisdictions; malware and cyber-attacks are criminal activities focused in having the best tools for the intended purpose (e.g. information theft, extortion), while remaining difficult to detect and defend against. Spreading malware a
22、s widely as possible across multiple networks is an effective tactic to this end, in large part because current detection and mitigation measures are taken from a the point of view of a single administrative domain; each operator or enterprise fights the threats locally, with limited or non-existent
23、 collaboration with other peers. Collaborative cross-domain network monitoring and mitigation seems to be a natural approach to fight these threats more efficiently. This approach includes technical solutions delivering distributed processing and computation, protocols, and data exchange allowing ne
24、twork operators to cooperate in network security monitoring efforts in a dynamic and efficient manner. This collaboration allows the scaling the defensive measures to the same level as those applied by the attackers. A keystone in this cross-domain collaboration is the communication and sharing of m
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIGSINS0092012IDENTITYANDACCESSMANAGEMENTFORNETWORKSANDSERVICESINSSECURITYANDPRIVACYREQUIREMENTSFORCOLLABORATIVECROSSDOMAINNETWORKMONITORINGV111

链接地址:http://www.mydoc123.com/p-733266.html