Hi Linda and Yoav,
Is there an I2NSF WG session in IETF 115 in London?

Since we have finished all the five I2NSF YANG drafts,
we can finalize the Re-chartering text and request the
approval of the IESG.

Here is the Re-chartering text:
-------------------------------

Charter for Working Group


Introduction

===============


Interface to Network Security Functions (I2NSF) provides security function
vendors, users, and operators with a standard framework and interfaces for
cloud-based security services. The I2NSF framework for those security
services consists of I2NSF User, Security Controller, Network Security
Functions (NSF), Developer’s Management System (DMS), and I2NSF Analyzer.


Goals

===============


I2NSF Working Group (WG) will standardize a framework and interfaces for
security management automation in an autonomous security system. For this
goal, it is necessary to have a closed-loop security control consisting of
security policy configuration, monitoring, notification, data analysis,
analytics information delivery, and security policy (re)configuration.
However, the following are needed for I2NSF:


1. The I2NSF framework needs to be extended to provide Security Management
Automation to a target network through a closed-loop security control. For
this Security Management Automation, I2NSF WG needs to identify which
system components and interfaces are required. Also, it enumerates and
analyzes what services are required for the I2NSF system.


2. The I2NSF framework needs a new interface (called Analytics Interface)
to deliver feedback messages for a security policy from I2NSF Analyzer to
Security Controller, or to share them among collaborating domains. In
addition, a proper translation of the planned actions for a given security
policy onto NSF capabilities requires a well-defined model for representing
these actions in the Security Controller.


3. The I2NSF framework needs Security Policy Translation from a high-level
security policy to a low-level security policy. To build a security policy
translator, a fundamental understanding is required for the relationship of
Consumer-Facing Interface and NSF-Facing Interface. An exemplary
architecture and procedure will be used for a security policy translator.


4. I2NSF is vulnerable to insider and supply chain attacks. The security
system may collapse if there is a malicious attack to the NSF capabilities
registration, the I2NSF user security policies declaration, the Security
Controller, or the monitoring data from an NSF. To prevent this malicious
activity from happening in the I2NSF framework or detect the root of a
security attack, all the activities in the I2NSF framework should be logged
for auditing in a security audit system (e.g., remote attestation and
Blockchain).


5. I2NSF can support IPsec Management for BGP routers in a centralized way
of Software-Defined Networking (SDN). I2NSF's Security Controller can be in
charge of IPsec parameter setting and key management for BGP routers which
establish IPsec sessions for their BGP message exchanges in a secure way.
For IPsec for BGP over IPsec, an interface can be defined for SDN-based
IPsec flow protection

in BGP.


6. I2NSF needs to support recently developed protocols such as QUIC and
HTTP/3. For this support, the I2NSF YANG data models, which are Capability,
Consumer-Facing Interface (CFI), NSF-Facing Interface (NFI), Registration
Interface (RI), and Monitoring Interface(MI), need to be extended to
accommodate those recently developed protocols.


Program of Work

===============


The I2NSF working group's deliverables include:


1. A single document for security management automation in the I2NSF
framework. This document will initially be used to enhance the I2NSF
framework for security management automation. It can be used as an
applicability document to handle various requirements and possible
approaches for such security management automation in real environments.


2. A YANG data model document for I2NSF Analytics Interface to deliver
analytics information from I2NSF Analyzer to Security Controller.


3. A single document for Guidelines for Security Policy Translation to
support the mapping between a high-level YANG module and a low-level YANG
module. This document can get feedback from NMRG and OPSAWG for the
synchronization with the translation work in those groups.


4. A YANG data model document for Remote Attestation Interface for the
remote attestation for I2NSF components, based on the work of the RATS WG.


5. A YANG data model document for BGP Interface for IPsec for BGP over
IPsec, based on the work of the IPSECME WG.


6. YANG data model documents for I2NSF Capability and Interfaces (i.e.,
CFI, NFI, RI, and MI) to support recently developed protocols (e.g., QUIC
and HTTP/3).


Milestones

===============


1. November 2022 Adopt security management automation in I2NSF framework as
a WG document


2. November 2022: Adopt a YANG data model for I2NSF Analytics Interface as
a WG document


3. November 2022: Adopt guidelines for security policy translation as a WG
document


4. March 2023: Adopt a YANG data model for Remote Attestation Interface as
a WG document


5. March 2023: Adopt a YANG data model for BGP IPsec Interface as a WG
document


6. November 2023: Adopt YANG data models for I2NSF Capability and
Interfaces (i.e., CFI, NFI, RI, and MI) as WG documents
-------------------------------


Thanks.

Best Regards,
Paul

-- 
===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Associate Professor
Department Head
Department of Computer Science and Engineering
Sungkyunkwan University
Office: +82-31-299-4957
Email: paulje...@skku.edu, jaehoon.p...@gmail.com
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php
<http://cpslab.skku.edu/people-jaehoon-jeong.php>
_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to