ITU-T SERIES X SUPP 7-2009 ITU-T X 1250 series C Supplement on overview of identity management in the context of cybersecurity (Study Group 17)《ITU-T X 290系列 关于网络安全环境中身份管理的综述补充 17号.pdf

上传人:刘芸 文档编号:803467 上传时间:2019-02-04 格式:PDF 页数:14 大小:83.05KB
下载 相关 举报
ITU-T SERIES X SUPP 7-2009 ITU-T X 1250 series C Supplement on overview of identity management in the context of cybersecurity (Study Group 17)《ITU-T X 290系列 关于网络安全环境中身份管理的综述补充 17号.pdf_第1页
第1页 / 共14页
ITU-T SERIES X SUPP 7-2009 ITU-T X 1250 series C Supplement on overview of identity management in the context of cybersecurity (Study Group 17)《ITU-T X 290系列 关于网络安全环境中身份管理的综述补充 17号.pdf_第2页
第2页 / 共14页
ITU-T SERIES X SUPP 7-2009 ITU-T X 1250 series C Supplement on overview of identity management in the context of cybersecurity (Study Group 17)《ITU-T X 290系列 关于网络安全环境中身份管理的综述补充 17号.pdf_第3页
第3页 / 共14页
ITU-T SERIES X SUPP 7-2009 ITU-T X 1250 series C Supplement on overview of identity management in the context of cybersecurity (Study Group 17)《ITU-T X 290系列 关于网络安全环境中身份管理的综述补充 17号.pdf_第4页
第4页 / 共14页
ITU-T SERIES X SUPP 7-2009 ITU-T X 1250 series C Supplement on overview of identity management in the context of cybersecurity (Study Group 17)《ITU-T X 290系列 关于网络安全环境中身份管理的综述补充 17号.pdf_第5页
第5页 / 共14页
点击查看更多>>
资源描述

1、 International Telecommunication Union ITU-T Series XTELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Supplement 7(02/2009) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY ITU-T X.1250 series Supplement on overview of identity management in the context of cybersecurity ITU-T X-series

2、 Recommendations Supplement 7 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499DIRECTORY X.500X.599 OSI NETWORKING AN

3、D SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.1050X.1069 Telebiometrics X.1080X.10

4、99 SECURE APPLICATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV security X.1180X.1199 CYBERSPACE SE

5、CURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 For further details, please refer to the list of ITU-T Recommendations. X series Supp

6、lement 7 (02/2009) i Supplement 7 to ITU-T X-series Recommendations ITU-T X.1250 series Supplement on overview of identity management in the context of cybersecurity Summary The security of the traditional public circuit switched telephone network (PSTN) has been addressed over many decades of opera

7、tion. However, the same cannot be said for distributed public packet-switched networks with multiple-service providers, such as the Internet and next generation networks (NGNs). Such networks use one common transport platform for control traffic and for user traffic which, in addition to the possibl

8、e anonymity of such traffic and the possibility of generating unidirectional traffic, makes such networks vulnerable to misuse. All electronic services (e-services such as e-business, e-commerce, e-health, e-government) are open to attack. This problem can be at least partly addressed by improving c

9、onfidence in the identity of users, network devices and service providers, so that they can be authenticated, granted appropriate access, and audited. Because identity management provides greater assurance and trust in user, service provider, and network device identities, it improves security by re

10、ducing exposure to security risks. This aspect of cybersecurity is something that service providers need to consider at a business and technical level, and that governments need to consider on a national level as part of the national cybersecurity plan. Source Supplement 7 to ITU-T X-series Recommen

11、dations was agreed on 20 February 2009 by ITU-T Study Group 17 (2009-2012). ii X series Supplement 7 (02/2009) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The

12、ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standard

13、ization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information te

14、chnology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this publication, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Complian

15、ce with this publication is voluntary. However, the publication may contain certain mandatory provisions (to ensure e.g. interoperability or applicability) and compliance with the publication is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory langu

16、age such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the publication is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this publ

17、ication may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the publication development process. As of the date of approval

18、 of this publication, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this publication. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent dat

19、abase at http:/www.itu.int/ITU-T/ipr/. ITU 2009 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. X series Supplement 7 (02/2009) iii CONTENTS Page 1 Scope 1 2 References. 1 3 Definitions 1 4 Abbreviations and ac

20、ronyms 1 5 Conventions 1 6 Importance of IdM to global network infrastructure protection and multi-national coordination for security. 1 7 Identity management as an enabler of trusted communication between two entities. 1 8 Protection, maintenance, revocation and control of identity data 2 9 “Discov

21、ery“ of trusted sources of identity data 2 10 Electronic government services (e-government services) 2 11 Regulatory considerations in connection with IdM 2 iv X series Supplement 7 (02/2009) Introduction Identity management (IdM) is a way to manage and control the information that is used in the co

22、mmunications process to represent entities (such as service providers, end-user organizations, people, network devices, software applications and services). A single entity may have multiple digital identities in order to access various services with differing requirements, and these may exist in mu

23、ltiple locations. IdM is a key component of cybersecurity because it provides the capability to establish and maintain trusted communications among entities. IdM supports authentication of an entity. It also enables the authorization of a range of privileges (rather than all-or-nothing privileges) a

24、nd makes it easier to change privileges if an entitys role changes. IdM also improves an organizations ability to apply its security policies by enabling an entitys activity on the network to be monitored and audited. IdM can provide access to entities both inside and outside an organization. In sho

25、rt, a good IdM solution provides capabilities to support authentication, provision and manage identities, and audit an entitys activities. IdM is a critical component in managing security and enabling nomadic, on-demand access to networks and e-services. Along with other defensive mechanisms (e.g.,

26、firewalls, intrusion detection systems, virus protection), IdM plays an important role in protecting information, communications and services from cybercrimes such as fraud and identity theft. One consequence of this is that users confidence will grow as e-transactions will be secure and reliable. I

27、n turn, this will increase users willingness to use IP networks for e-services. In implementing an IdM system, fundamental privacy concerns must be addressed. This means developing methods to ensure that identity information is accurate and to prevent identity information from being used for purpose

28、s beyond those for which it was collected. X series Supplement 7 (02/2009) 1 Supplement 7 to ITU-T X-series Recommendations ITU-T X.1250 series Supplement on overview of identity management in the context of cybersecurity 1 Scope Identity management has emerged as a critical component that will impr

29、ove security by providing greater assurance by verifying the validity of identity information. This supplement provides a general overview of this new service. The use of the term “identity“ in this supplement relating to IdM does not indicate its absolute meaning. In particular, it does not constit

30、ute any positive validation. 2 References None. 3 Definitions Definitions can be found in other ITU-T Recommendations of the X.1250 series. 4 Abbreviations and acronyms This supplement uses the following abbreviations: IdM Identity Management IP Internet Protocol PSTN Public Switched Telephone Netwo

31、rk 5 Conventions None. 6 Importance of IdM to global network infrastructure protection and multi-national coordination for security Proper implementation and use of IdM capabilities and practices in various national, regional, and international networks will enhance the security of the global networ

32、k infrastructure. IdM best practices and implementations are important and necessary to provide assurance of identity information and of the integrity and availability of the global network infrastructure. IdM capabilities can be used to support national and international emergency telecommunication

33、 services by identifying users authorized for special services. In addition, IdM capabilities can be used to prevent, detect, and support coordination of responses to national and international cybersecurity incidents. In some instances, IdM may help authorities and entities coordinate their efforts

34、 to trace and locate the source of such incidents. 2 X series Supplement 7 (02/2009) 7 Identity management as an enabler of trusted communication between two entities One important function of IdM is the authentication of users, networks or services. In an authentication process involving two entiti

35、es, one entity makes assertions about its identity to the other. Depending on the second entitys security requirements, these assertions may need to be validated before the second entity will trust the first enough to grant it privileges. This process may be required in both directions. There are va

36、rious levels of authentication trust ranging from little-or-none, weak (e.g., user name and password), to strong (e.g., public key infrastructure (ITU-T X.509). A risk assessment can identify the appropriate level of authentication. There may need to be higher levels of authentication for one entity

37、 than for the other, for example, because one entity controls critical resources. 8 Protection, maintenance, revocation and control of identity data Other important functions of IdM are to protect, maintain, and control trusted identity data, including the ability to ascertain the current status of

38、an identity. Laws or policies may require that personally identifiable information is protected and that identity information is prevented from being used for purposes beyond those for which it was collected. Ensuring that identity data continues to be valid is another primary concern. For the servi

39、ces that use them to be viable, identity data must be properly maintained so that it is accurate, timely and consistent. Where relevant, management of identity data attributes should include the capability to check the identity data to see if it has been revoked. In many cases, entities will want to

40、 control the use of their own data and private information. 9 “Discovery“ of trusted sources of identity data IdM also encompasses the concept of “discovery“ of trusted identity data. In a highly distributed, multi-provider environment (such as the Internet and next generation networks), identity da

41、ta necessary to provide trust in the identity and related assertions of an entity can be located in different places on the network. Entities may have multiple digital identities with different sources of identity information in different locations. When one of the two entities in an authentication

42、process is nomadic, the other entity will need to locate and establish a trust relationship with an appropriate source of identity information in order to complete the process of authenticating the nomadic entity. The concept of discovery of sources of trusted information is similar to what occurs t

43、oday in mobile cell phone usage. 10 Electronic government services (e-government services) The advantages of an entity to implement IdM include risk reduction, trust enhancement, increased functionality and the potential for cost reduction. These reasons for implementing IdM are equally valid when t

44、he entity is a government. In e-government services, the main objectives are also to cut costs and to provide more efficient and more effective services to the governments citizens and business partners. Like other entities, governments are confronted by the challenge of how to effectively and effic

45、iently utilize identity in the networked world. In order to make e-government services a reality, a government must perform risk analyses on the e-services it intends to offer and implement suitable protective measures. The sensitive nature of many e-government services (for example, e-health) may r

46、equire a government to require strong authentication. X series Supplement 7 (02/2009) 3 11 Regulatory considerations in connection with IdM National administrations and regional groups need to consider a number of potential regulatory issues in connection with IdM implementation, such as privacy and

47、 data protection, national security and emergency preparedness, and mandatory settlements between carriers. Governments not only utilize identity management techniques but may also impose it on other entities to meet a broad array of national policy and security objectives. 4 X series Supplement 7 (

48、02/2009) Selected list of activities related to Identity Management Various forums are working on IdM issues. These include: ARK (California Digital Library Archival Resource Key): http:/www.cdlib.org/inside/diglib/ark/(ARK) 3GPP SA3: http:/www.3gpp.org/tb/sa/sa3/ToR.htm ETSI TISPAN WG7: http:/www.e

49、tsi.org/tispan/ EU eID Roadmap: http:/ec.europa.eu/information_society/activities/egovernment_research/doc/eidm_roadmap_paper.pdf European Citizen Card: http:/europa.eu.int/idabc/servlets/Doc?id=19132 FIDIS (EU Future of Identity in the Information Society): http:/ FIRST (Forum of Incident Response and Security Teams): http:/www.first.org/ Guide project (EU Government User Identity for Europe): http:/www.guide-project.org Handle: http:/ Higgins: http:/www.eclipse.org/higg

展开阅读全文
相关资源
猜你喜欢
  • ANSI INCITS ISO IEC 14362-1996 Information technology - Test methods for measuring conformance to Open Systems Interconnection (OSI) abstract data manipulation - Application Prograd.pdf ANSI INCITS ISO IEC 14362-1996 Information technology - Test methods for measuring conformance to Open Systems Interconnection (OSI) abstract data manipulation - Application Prograd.pdf
  • ANSI INCITS ISO IEC 14363-1996 Information technology - Test methods for measuring conformance to MHS-based electronic messaging - Application Program Interface (API) [Language ind.pdf ANSI INCITS ISO IEC 14363-1996 Information technology - Test methods for measuring conformance to MHS-based electronic messaging - Application Program Interface (API) [Language ind.pdf
  • ANSI INCITS ISO IEC 14364-1996 Information technology - Open Systems Interconnection (OSI) abstract data manipulation C language interfaces - Binding for Application Program Interf.pdf ANSI INCITS ISO IEC 14364-1996 Information technology - Open Systems Interconnection (OSI) abstract data manipulation C language interfaces - Binding for Application Program Interf.pdf
  • ANSI INCITS ISO IEC 14365-1996 Information technology - MHS-based electronic messaging C language interfaces - Binding for Application Program Interface (API) (Adopted by INCITS).pdf ANSI INCITS ISO IEC 14365-1996 Information technology - MHS-based electronic messaging C language interfaces - Binding for Application Program Interface (API) (Adopted by INCITS).pdf
  • ANSI INCITS ISO IEC 14366-1996 Information technology - Test methods for measuring conformance to Open Systems Interconnection (OSI) abstract data manipulation C language interfaceP.pdf ANSI INCITS ISO IEC 14366-1996 Information technology - Test methods for measuring conformance to Open Systems Interconnection (OSI) abstract data manipulation C language interfaceP.pdf
  • ANSI INCITS ISO IEC 14367-1996 Information technology - Test methods for measuring conformance to MHS-based electronic messaging C language interfaces - Binding for Application Pro.pdf ANSI INCITS ISO IEC 14367-1996 Information technology - Test methods for measuring conformance to MHS-based electronic messaging C language interfaces - Binding for Application Pro.pdf
  • ANSI INCITS ISO IEC 14417-1999 Information technology - Data recording format DD-1 for magnetic tape cassette conforming to ISO IEC 1016 (Adopted by INCITS).pdf ANSI INCITS ISO IEC 14417-1999 Information technology - Data recording format DD-1 for magnetic tape cassette conforming to ISO IEC 1016 (Adopted by INCITS).pdf
  • ANSI INCITS ISO IEC 14443-1-2008 Identification cards - Contactless integrated circuit cards - Proximity cards - Part 1 Physical characteristics.pdf ANSI INCITS ISO IEC 14443-1-2008 Identification cards - Contactless integrated circuit cards - Proximity cards - Part 1 Physical characteristics.pdf
  • ANSI INCITS ISO IEC 14443-2 AMD 1-2005 Identification cards - Contactless integrated circuit(s) cards - Proximity cards Part 2 Radio frequency power and signal interface - Amendmen.pdf ANSI INCITS ISO IEC 14443-2 AMD 1-2005 Identification cards - Contactless integrated circuit(s) cards - Proximity cards Part 2 Radio frequency power and signal interface - Amendmen.pdf
  • 相关搜索

    当前位置:首页 > 标准规范 > 国际标准 > 其他

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1