ETSI TR 102 661-2009 Lawful Interception (LI) Security framework in Lawful Interception and Retained Data environment (V1 2 1)《合法侦听(LI) 合法侦听和保留数据环境中的安全框架(版本1 2 1)》.pdf
《ETSI TR 102 661-2009 Lawful Interception (LI) Security framework in Lawful Interception and Retained Data environment (V1 2 1)《合法侦听(LI) 合法侦听和保留数据环境中的安全框架(版本1 2 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI TR 102 661-2009 Lawful Interception (LI) Security framework in Lawful Interception and Retained Data environment (V1 2 1)《合法侦听(LI) 合法侦听和保留数据环境中的安全框架(版本1 2 1)》.pdf(46页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI TR 102 661 V1.2.1 (2009-11)Technical Report Lawful Interception (LI);Security framework in Lawful Interceptionand Retained Data environmentETSI ETSI TR 102 661 V1.2.1 (2009-11) 2Reference RTR/LI-00065 Keywords lawful interception, security ETSI 650 Route des Lucioles F-06921 Sophia Antipolis C
2、edex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.etsi.org The present docu
3、ment may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the
4、PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal.etsi.org/tb/status/sta
5、tus.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction exte
6、nd to reproduction in all media. European Telecommunications Standards Institute 2009. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTM, TIPHONTM, the TIPHON logo and the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the be
7、nefit of its Members and of the 3GPP Organizational Partners. LTE is a Trade Mark of ETSI currently being registered for the benefit of its Members and of the 3GPP Organizational Partners. GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI TR 102 661 V1.2.1 (
8、2009-11) 3Contents Intellectual Property Rights 5g3Foreword . 5g3Introduction 5g31 Scope 6g32 References 6g32.1 Normative references . 6g32.2 Informative references 6g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 8g34 The architecture 9g34.1 Functional architecture . 9
9、g34.2 The supervisory role of Regulatory Authority in third party auditing 11g35 Inventory of assets 11g36 Security threats and vulnerabilities 12g36.1 Security threats . 12g36.2 Security vulnerabilities . 14g36.3 Attack scenarios . 14g37 Security measures . 15g37.1 Personnel security. 15g37.2 Incid
10、ent handling 16g37.3 Physical and environmental security 16g37.4 Media handling . 17g37.5 Access control 18g37.6 Confidentiality 19g37.6.1 Confidentiality of stored data 19g37.6.2 Confidentiality of transmitted (INI and HI interfaces) data 19g37.7 Data and system integrity . 20g37.7.1 Integrity of t
11、he LI/DR system software 20g37.7.2 Integrity of stored data 20g37.7.3 Integrity of transmitted data 20g37.8 Non-repudiation . 21g37.9 Availability . 21g37.9.1 Protection against denial of service attacks 21g37.9.2 Fault tolerance 22g37.9.3 Disaster recovery 22g37.10 Secure, verifiable and intelligib
12、le logging 22g37.10.1 Requirements 22g37.11 Secure information destruction. 25g37.12 Development, maintenance and repair . 25g3Annex A: List of security measures 27g3A.1 Introduction 27g3Annex B: Building secure logging. 33g3B.1 A generic methodology for defining and organizing log information in an
13、 LI/DR environment 33g3B.2 Providing secure log files . 34g3B.3 Providing the skeleton for implementing a secure log environment 34g3B.4 References annex B 35g3ETSI ETSI TR 102 661 V1.2.1 (2009-11) 4Annex C: Protection of retained data . 36g3C.1 Introduction 36g3C.2 Overview of the proposed system 3
14、6g3C.3 Encryption and storage of retained data record 37g3C.4 Query and retrieval of retained data . 37g3C.5 Purging of RD Store . 37g3C.6 Discussion of resilience and vulnerability 37g3Annex D: Guide for selecting cryptographic algorithms and minimum key sizes in LI/DR systems . 38g3D.1 Introductio
15、n 38g3D.2 Cryptographic security strength basis and LI/DR systems . 39g3D.2.1 Bits of security . 39g3D.2.2 Bits of security in LI/DR systems 39g3D.3 LI/DR information classification 39g3D.3.1 Classified information 40g3D.3.2 Personal data 40g3D.3.3 Classification levels equivalence 40g3D.4 Cryptogra
16、phic algorithms and key sizes for LI/DR systems 40g3D.4.1 Minimum bits of security . 40g3D.4.2 Symmetric key algorithms 41g3D.4.3 Asymmetric key algorithms . 41g3D.4.4 Hash functions 42g3D.4.5 Summary table 43g3D.4.6 Algorithm suites . 43g3Annex E: Bibliography 44g3Annex F: Change request history .
17、45g3History 46g3ETSI ETSI TR 102 661 V1.2.1 (2009-11) 5Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and
18、can be found in ETSI SR 000 314: “Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pur
19、suant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present do
20、cument. Foreword This Technical Report (TR) has been produced by ETSI Technical Committee Lawful Interception (LI). Introduction Communication privacy is considered as a valuable asset by the Internet, fixed and mobile telephony providers of electronic communication networks. Indeed, incidents of pr
21、ivacy violations against their subscribers may cause severe impact with commercial and legal consequences. Above considerations are more important when these networks operate critical services in terms of communication privacy, such as, Lawful Interception (LI) and Data Retention (DR) services. Henc
22、e, special state-of-the art technologies and mechanisms together with a range of well-defined technical and procedural measures are recommended to be applied in order to verify and maintain an acceptable security level. ETSI ETSI TR 102 661 V1.2.1 (2009-11) 61 Scope The scope of the present document
23、 is to recommend a framework for the secure provision of Lawful Interception (LI) and Data Retention (DR) services of a Communication Service Provider (CSP) towards the Law Enforcement Agencies. This framework aims to guarantee security in terms of confidentiality, integrity, forward secrecy, forwar
24、d integrity and non-repudiation within CSPs LI and DR systems, operations and CSP internal and external interfaces for the delivery of IRI, CC and DR data towards any LEAs. The present document initially describes the assets to be protected and then analyses the related security threats. Finally it
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSITR1026612009LAWFULINTERCEPTIONLISECURITYFRAMEWORKINLAWFULINTERCEPTIONANDRETAINEDDATAENVIRONMENTV121

链接地址:http://www.mydoc123.com/p-736084.html