Linda,
Thanks for your kind leadship.

Best Regards,
Paul

2022년 9월 19일 (월) 오후 11:10, Linda Dunbar <dunbar...@gmail.com>님이 작성:

> Paul,
>
> Thank you for the proposed charter. We can have a session in IETF 115 to
> discuss.
>
> Linda
>
> On Mon, Sep 19, 2022 at 8:44 AM Mr. Jaehoon Paul Jeong <
> jaehoon.p...@gmail.com> wrote:
>
>> Hi Linda and Yoav,
>> Is there an I2NSF WG session in IETF 115 in London?
>>
>> Since we have finished all the five I2NSF YANG drafts,
>> we can finalize the Re-chartering text and request the
>> approval of the IESG.
>>
>> Here is the Re-chartering text:
>> -------------------------------
>>
>> Charter for Working Group
>>
>>
>> Introduction
>>
>> ===============
>>
>>
>> Interface to Network Security Functions (I2NSF) provides security
>> function vendors, users, and operators with a standard framework and
>> interfaces for cloud-based security services. The I2NSF framework for those
>> security services consists of I2NSF User, Security Controller, Network
>> Security Functions (NSF), Developer’s Management System (DMS), and I2NSF
>> Analyzer.
>>
>>
>> Goals
>>
>> ===============
>>
>>
>> I2NSF Working Group (WG) will standardize a framework and interfaces for
>> security management automation in an autonomous security system. For this
>> goal, it is necessary to have a closed-loop security control consisting of
>> security policy configuration, monitoring, notification, data analysis,
>> analytics information delivery, and security policy (re)configuration.
>> However, the following are needed for I2NSF:
>>
>>
>> 1. The I2NSF framework needs to be extended to provide Security
>> Management Automation to a target network through a closed-loop security
>> control. For this Security Management Automation, I2NSF WG needs to
>> identify which system components and interfaces are required. Also, it
>> enumerates and analyzes what services are required for the I2NSF system.
>>
>>
>> 2. The I2NSF framework needs a new interface (called Analytics Interface)
>> to deliver feedback messages for a security policy from I2NSF Analyzer to
>> Security Controller, or to share them among collaborating domains. In
>> addition, a proper translation of the planned actions for a given security
>> policy onto NSF capabilities requires a well-defined model for representing
>> these actions in the Security Controller.
>>
>>
>> 3. The I2NSF framework needs Security Policy Translation from a
>> high-level security policy to a low-level security policy. To build a
>> security policy translator, a fundamental understanding is required for the
>> relationship of Consumer-Facing Interface and NSF-Facing Interface. An
>> exemplary architecture and procedure will be used for a security policy
>> translator.
>>
>>
>> 4. I2NSF is vulnerable to insider and supply chain attacks. The security
>> system may collapse if there is a malicious attack to the NSF capabilities
>> registration, the I2NSF user security policies declaration, the Security
>> Controller, or the monitoring data from an NSF. To prevent this malicious
>> activity from happening in the I2NSF framework or detect the root of a
>> security attack, all the activities in the I2NSF framework should be logged
>> for auditing in a security audit system (e.g., remote attestation and
>> Blockchain).
>>
>>
>> 5. I2NSF can support IPsec Management for BGP routers in a centralized
>> way of Software-Defined Networking (SDN). I2NSF's Security Controller can
>> be in charge of IPsec parameter setting and key management for BGP routers
>> which establish IPsec sessions for their BGP message exchanges in a secure
>> way. For IPsec for BGP over IPsec, an interface can be defined for
>> SDN-based IPsec flow protection
>>
>> in BGP.
>>
>>
>> 6. I2NSF needs to support recently developed protocols such as QUIC and
>> HTTP/3. For this support, the I2NSF YANG data models, which are Capability,
>> Consumer-Facing Interface (CFI), NSF-Facing Interface (NFI), Registration
>> Interface (RI), and Monitoring Interface(MI), need to be extended to
>> accommodate those recently developed protocols.
>>
>>
>> Program of Work
>>
>> ===============
>>
>>
>> The I2NSF working group's deliverables include:
>>
>>
>> 1. A single document for security management automation in the I2NSF
>> framework. This document will initially be used to enhance the I2NSF
>> framework for security management automation. It can be used as an
>> applicability document to handle various requirements and possible
>> approaches for such security management automation in real environments.
>>
>>
>> 2. A YANG data model document for I2NSF Analytics Interface to deliver
>> analytics information from I2NSF Analyzer to Security Controller.
>>
>>
>> 3. A single document for Guidelines for Security Policy Translation to
>> support the mapping between a high-level YANG module and a low-level YANG
>> module. This document can get feedback from NMRG and OPSAWG for the
>> synchronization with the translation work in those groups.
>>
>>
>> 4. A YANG data model document for Remote Attestation Interface for the
>> remote attestation for I2NSF components, based on the work of the RATS WG.
>>
>>
>> 5. A YANG data model document for BGP Interface for IPsec for BGP over
>> IPsec, based on the work of the IPSECME WG.
>>
>>
>> 6. YANG data model documents for I2NSF Capability and Interfaces (i.e.,
>> CFI, NFI, RI, and MI) to support recently developed protocols (e.g., QUIC
>> and HTTP/3).
>>
>>
>> Milestones
>>
>> ===============
>>
>>
>> 1. November 2022 Adopt security management automation in I2NSF framework
>> as a WG document
>>
>>
>> 2. November 2022: Adopt a YANG data model for I2NSF Analytics Interface
>> as a WG document
>>
>>
>> 3. November 2022: Adopt guidelines for security policy translation as a
>> WG document
>>
>>
>> 4. March 2023: Adopt a YANG data model for Remote Attestation Interface
>> as a WG document
>>
>>
>> 5. March 2023: Adopt a YANG data model for BGP IPsec Interface as a WG
>> document
>>
>>
>> 6. November 2023: Adopt YANG data models for I2NSF Capability and
>> Interfaces (i.e., CFI, NFI, RI, and MI) as WG documents
>> -------------------------------
>>
>>
>> Thanks.
>>
>> Best Regards,
>> Paul
>>
>> --
>> ===========================
>> Mr. Jaehoon (Paul) Jeong, Ph.D.
>> Associate Professor
>> Department Head
>> Department of Computer Science and Engineering
>> Sungkyunkwan University
>> Office: +82-31-299-4957
>> Email: paulje...@skku.edu, jaehoon.p...@gmail.com
>> Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php
>> <http://cpslab.skku.edu/people-jaehoon-jeong.php>
>>
> _______________________________________________
>> I2nsf mailing list
>> I2nsf@ietf.org
>> https://www.ietf.org/mailman/listinfo/i2nsf
>>
> --
===========================
Mr. Jaehoon (Paul) Jeong, Ph.D.
Associate Professor
Department Head
Department of Computer Science and Engineering
Sungkyunkwan University
Office: +82-31-299-4957
Email: paulje...@skku.edu, jaehoon.p...@gmail.com
Personal Homepage: http://iotlab.skku.edu/people-jaehoon-jeong.php
<http://cpslab.skku.edu/people-jaehoon-jeong.php>
_______________________________________________
I2nsf mailing list
I2nsf@ietf.org
https://www.ietf.org/mailman/listinfo/i2nsf

Reply via email to