ImageVerifierCode 换一换
格式:PDF , 页数:58 ,大小:346.82KB ,
资源ID:433434      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-433434.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ANSI ATIS 0300276-2008 Operations Administration Maintenance and Provisioning Security Requirements for the Public Telecommunications Network A Baseline of Security Requirements fo.pdf)为本站会员(ideacase155)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ANSI ATIS 0300276-2008 Operations Administration Maintenance and Provisioning Security Requirements for the Public Telecommunications Network A Baseline of Security Requirements fo.pdf

1、 AMERICAN NATIONAL STANDARD FOR TELECOMMUNICATIONS ATIS-0300276.2008 OPERATIONS, ADMINISTRATION, MAINTENANCE, AND PROVISIONING SECURITY REQUIREMENTS FOR THE PUBLIC TELECOMMUNICATIONS NETWORK: A BASELINE OF SECURITY REQUIREMENTS FOR THE MANAGEMENT PLANE ATIS is the leading technical planning and stan

2、dards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry. More than 200 companies actively formulate standards in ATIS Committees, covering issues including: IPTV, Cloud Services, Energy Effici

3、ency, IP-Based and Wireless Technologies, Quality of Service, Billing and Operational Support, Emergency Services, Architectural Platforms and Emerging Networks. In addition, numerous Incubators, Focus and Exploratory Groups address evolving industry priorities including Smart Grid, Machine-to-Machi

4、ne, Networked Car, IP Downloadable Security, Policy Management and Network Optimization. ATIS is the North American Organizational Partner for the 3rd Generation Partnership Project (3GPP), a member and major U.S. contributor to the International Telecommunication Union (ITU) Radio and Telecommunica

5、tions Sectors, and a member of the Inter-American Telecommunication Commission (CITEL). ATIS is accredited by the American National Standards Institute (ANSI). For more information, please visit . AMERICAN NATIONAL STANDARD Approval of an American National Standard requires review by ANSI that the r

6、equirements for due process, consensus, and other criteria for approval have been met by the standards developer. Consensus is established when, in the judgment of the ANSI Board of Standards Review, substantial agreement has been reached by directly and materially affected interests. Substantial ag

7、reement means much more than a simple majority, but not necessarily unanimity. Consensus requires that all views and objections be considered, and that a concerted effort be made towards their resolution. The use of American National Standards is completely voluntary; their existence does not in any

8、 respect preclude anyone, whether he has approved the standards or not, from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standards. The American National Standards Institute does not develop standards and will in no circumstances give an in

9、terpretation of any American National Standard. Moreover, no person shall have the right or authority to issue an interpretation of an American National Standard in the name of the American National Standards Institute. Requests for interpretations should be addressed to the secretariat or sponsor w

10、hose name appears on the title page of this standard. CAUTION NOTICE: This American National Standard may be revised or withdrawn at any time. The procedures of the American National Standards Institute require that action be taken periodically to reaffirm, revise, or withdraw this standard. Purchas

11、ers of American National Standards may receive current information on all standards by calling or writing the American National Standards Institute. Notice of Disclaimer however, many new security challenges are introduced. Threats in the end-user plane now become threats to the management and contr

12、ol planes. The management plane now becomes accessible to the multitude of end-users, and many types of malicious activities become possible. The purpose of this standard is to recommend minimum baseline security mechanisms to help mitigate security risks in the management of telecommunications netw

13、orks. To provide a complete end-to-end solution, all security measures (e.g., access control, authentication) should be applied to each type of network activity (i.e., management plane activity, control plane activity, and end user plane activity) for the network infrastructure, network services, an

14、d network applications. This standard focuses specifically on the security aspect of the management plane for network elements (NE) and management systems (MS), which are part of the network infrastructure. As such, the standard addresses only one aspect of an overall end-to-end security solution, b

15、ut may be used as a starting point for subsequent standards addressing the security of “control” and “end user” planes, as appropriate. The requirements in this standard are applicable to NEs and MSs to be deployed in the future. For NEs in the network that do not meet all the mandatory security req

16、uirements, the overall security requirements at the network architecture design should be supported. This standard addresses security for NE, MS, and element management system (EMS) equipment, and does not specifically address security for other ATIS-0300276.2008 2 equipment such as customer premise

17、 equipment (e.g., voice over Internet Protocol IP telephones) or independent test gear. For such other equipment, all mandatory requirements in this standard should be considered objective recommendations. This standard has been used by the International Telecommunication Union Telecommunications Se

18、ctor (ITU-T) as the base to develop the M.3016.x series of Recommendations. ITU-T Recommendations M.3016.1, M.3016.2 and M.3016.3 specify the requirements, services, and mechanisms for the appropriate security of the management functions necessary to support the telecommunications infrastructure. Be

19、cause different administrations and organizations require varying levels of security support, ITU-T Recs. M.3016.1, M.3016.2 and M.3016.3 do not specify whether a requirement/service/mechanism is mandatory or optional. ITU-T Rec. M.3016.4 defines a profile proforma template to assist administrations

20、 and other national/international organizations to specify the mandatory and optional support of the requirements as well as value ranges, values, etc. to help implement their security policies. This standard requires all implementers to list the security requirements supported in their implementati

21、ons in terms of the requirements as enumerated by this standard. In addition, this standard suggests that for implementers with international interests, the ITU-T M.3016.x series of Recommendations may also be used to specify the security profiles of their implementations. If an implementer chooses

22、to provide such a dual specification of their security implementation, then a mapping between the requirements as enumerated by this standard and those enumerated by the ITU-T M.3016.x series should also be provided. Note that if this “dual specification” process becomes widely adopted, then this st

23、andard may be updated in the future to include the preferred mapping algorithm in order to reduce the possibility of different mapping algorithms being used by different implementers. 1.1 Framework and Model In the context of this standard, to secure something means to protect it (i.e., computers, n

24、etworks, data, or other resources) from unauthorized access, use, or activity. Loss of data, denial of service (DoS), theft of service, and loss of customer confidence are only some of the results of security incidents. System and network administrators need to protect systems and their component el

25、ements from users and from attackers. Although security is multifaceted (spanning operations, physical, communications, processing, and personnel), of concern here are security problems resulting from weaknesses inherent in commonly employed configurations and technology. A threat consists of, but i

26、s not limited to, disclosure, unauthorized use, change, and denial of service. Table 1 lists some security threats. Table 1 - Threats Threat Category*Examples of Threats Unauthorized Access Hacking Unauthorized system access to carry out attacks Theft of service Masquerade Session replay Session hij

27、acking Man-in-the-middle attacks Threats to System Integrity Unauthorized manipulation of system configuration files Unauthorized manipulation of system data Threats to Communication Integrity Unauthorized manipulation of data in transit Threats to Confidentiality Eavesdropping Session recording and

28、 disclosure Privacy violations ATIS-0300276.2008 3 Denial of Service (DoS) Transmission control protocol (TCP) SYN flood Malformed packet attacks Distributed DoS *Derived from T1.233-1993 (R1999), Operations, Administration, Maintenance, and ProvisioningSecurity Framework for Telecommunications Mana

29、gement Network Interfaces and International Organization of Standardization (ISO) 7498-2: 1989 Information Processing SystemsOpen Systems Interconnection Basic Reference ModelPart 2: Security Architecture.1These security threats may be minimized or mitigated within a network system or NE platform or

30、 application by inclusion of security services (as defined in ISO 7498-2:1989 Information Processing SystemsOpen Systems Interconnection Basic Reference ModelPart 2: Security Architecture) to enforce the following: Identification and AUTHENTICATION; Authorization and ACCESS CONTROL Level; Data Integ

31、rity; Privacy and Confidentiality; and Nonrepudiation. This standard addresses security for the management plane - that is, security features to ensure that the network can be administered and managed in a secure manner. Some vulnerability may still exist, even after following the recommendations co

32、ntained in this standard. The following risks are among those with the capability to compromise the management plane: Inappropriate actions by authorized users. These actions can be either malevolent or accidental. Security for the control plane (e.g., signaling, routing, naming, and discovery proto

33、cols) and the end-user plane. The effects of vulnerabilities in specific protocols. Malware (e.g., viruses, Trojan horses, worms, or other embedded code). Once malware successfully compromises any NE/MS, the malware may use the secure network communication links to transmit attacks to other NE/MS co

34、mponents. These attacks may continue until network managers detect the attack and take action to eliminate it. This standard is concerned with the security of management traffic, especially when it traverses networks mixed with end-user traffic. Figure 1 illustrates a reference model that is used to

35、 specify network management security solutions. This model is used to examine logical communication paths within the entire network, and quantify which protocols are used for communications on each path. Using this model, threats and vulnerabilities can be examined for each path, and appropriate sec

36、urity mechanisms can be applied. Multivendor NEs are shown at the bottom of the model in Figure 1. EMSs that provide specific management functions for the particular NE are illustrated above the NE. The network management system (NMS) itself is at the top of the model. The NMS provides overall manag

37、ement to the NE and EMS, and contains specific service and business management applications (e.g., configuration and billing 1A form for requesting historical ATIS documents can be found at , which should be emailed to . ATIS-0300276.2008 4 systems). Remote and local operators are also shown in the

38、model, and communication paths are shown with all other system elements. Network ManagementSystemNetwork ElementRemoteOperatorLocalOperatorNetwork ElementMulti-VendorNetwork Element2. NMS to NE1. NMS to EMS3. EMS to NE4. Remote Operatorto NMS5. Remote Operatorto EMS6. Remote Operatorto NE7. Local Op

39、eratorto NMS9. Local Operatorto NE8. Local Operatorto EMS10. NE to NE11. NE to Foreign NE2. NMS to NEElement ManagementSystemElement ManagementSystem12. EMS to EMSFigure 1 - Network management security reference model The Security Reference Model (Figure 1) may also be useful in correlating telecomm

40、unications management network (TMN)-defined interfaces to the security model. The TMN is defined in International Telecommunication Union Telecommunications Sector (ITU-T) Recommendation M.3010, Principles for a telecommunications management network. It is defined as an architecture for management,

41、including planning, provisioning, installation, maintenance, operations, and administration of telecommunications equipment, networks, and services. In the TMN standard, against which service providers have indicated they will standardize, it is identified that multiple network infrastructures and m

42、ultiple TMNs may exist. In fact, the management of NEs by their associated MSs in the typical service provider environment may traverse numerous data communications networks (DCN). This management traffic may need to negotiate several access control mechanisms (e.g., firewall devices or router acces

43、s lists, and/or network connections and interconnections) in order to get to the NE in question. NEs must traverse many of the same networks and interconnections for return traffic. As such, vendors should know and understand the possible latency issues and work towards delivering solutions to addre

44、ss those issues. ATIS-0300276.2008 5 1.2 Design Guidelines Table 2 presents design guideline objectives that attempt to satisfy the requirements in clause 5 to mitigate the threats proposed in Table 1. Table 2 - Design Guidelines Considered Guideline Description Isolation Insulation of management tr

45、affic from customer traffic. Effective Security Policies Requirements and supporting architectures must allow for policies that are definable, flexible, enforceable, auditable, verifiable, reliable, and usable. Strong AUTHENTICATION, Authorization, and Accounting (AAA) Two-factor and cryptographical

46、ly secure AAA. Highest Benefit for a Given Cost Improve security by implementing security mechanisms that have widely available implementations and widespread deployment, so that use histories allow security mechanisms to be reviewed. Path for Improvement Consider next steps for enhancing and improv

47、ing network management security to further satisfy given requirements with evolving technology and mechanisms, or to satisfy newly defined security requirements. Technical Feasibility Requirements shall be satisfied with products, solutions, and/or technologies available today. Housekeeping Requirem

48、ents should be consistent with standard operating procedures of well-run network management operations. Open Standards Use ideas and concepts that are already standardized (e.g., IP security IPsec, digital signatures). All aspects of the open standards should be addressed including system, protocols

49、, modes, algorithm, option, key size, and encoding. 1.3 Applicability of this standard to the TMN This standard applies to the entirety of the TMN covering both circuit-based NEs and packet-based NEs. Circuit-based NEs provide multiple logical interfaces between switches, transmission elements, signaling elements, and other special-purpose elements that are designed and developed to support traditional telephony services. The packet-based NE model has migrated from the centralized system where all functions were hosted on one platform to a more distributed

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1