Apr21-summary
|
Page Content
Executive Summary Meeting of ITU-T SG17 'Security', virtual, 20-30 April 2021 Hot topics - Quantum Key Distribution Network
- 5G security
- Cloud Computing Security
- Identity management
- De-identification
- DLT security
- Security management
Meeting Output- TAP approval (3):1 new and 2 revised Recommendations, Details are in Annex A a).
- TAP determined (1): 1 new Recommendation, Details are in Annex A d).
- AAP consented (14): 4 new and 10 revised Recommendations, for AAP Last Call. Details are in Annex A e).
- Agreed (2): 1 Implementer's Guide and 1 Corrigenda to SG17 Technical Report. Details are in Annex A c).
- New work items (15): 15 NWIs on new or revised SG17 publications were agreed to be added to the SG17 Work Programme. Details are in Annex B.
- 4 New OID registration authorities:
- Vietnam: {joint-iso-itu-t(2) country(16) vn(704)}
- Ecuador: {joint-iso-itu-t(2) country(16) ec(218)}
- Jamaica: {joint-iso-itu-t(2) country(16) jm(388)}
- Bahrain: {joint-iso-itu-t(2) country(16) bh(48)}
- Workshops:
- ITU workshop on Vaccination Certificate, jointly organized by ITU-T SG17 and SG16, with external organizations, date tbd in 2021
- a workshop on Decentralized Identity (DID) using Distributed Ledger Technology (DLT) for developing countries, during BDT Emerging technology week 2021, 5-9 July 2021
Next SG17 meetings- Tue 24 Aug – Fri 3 Sept 2021 SG17 meeting (virtual) (9 working days) 10:00-16:00
- Open and extended management team meeting on Mon 23 Aug 2021, 13:00-15:00
- 41 texts are candidate for action, see Annex A f) and g).
- 7 Jan 2022, SG17 e-plenary (virtual, tbc)
- SG17 special e-plenary before WTSA-20.
- 1st SG17 meeting in next study period: tbd in SG17 Aug/Sep 2021 meeting.
- Interim RGMs: 7 Questions plan to hold 7 RGMs.
-
| Q | Date | Place/Host | Subject/objective | 1. | 2/17 | 1-2 July 2021 | e-meeting | - To address all work items of Q2/17
| 2. | 4/17 | 24-25 June 2021 | e-meeting | - To prepare Q4 candidate texts for action in next SG17 meeting, including addressing late Contribution C1061.
| 3. | 8/17 | 11-12 June 2021 | e-meeting | - To address all items of Q8/17
| 4. | 10/17 | tbc (June 2021) | e-meeting | - To progress all the work of Q10/17
| 5. | 11/17 | tbc | e-meeting | - Joint meeting with ISO/IEC JTC1/SC6/WG10
- Calendar in TD3754
| 6. | 14/17
| tbc (June 2021) | e-meeting | - work on X.srip-dlt, X.das-mgt, X.ss-dlt, X.tf-spd-dlt
- joint session with Q22/16
- preparation for workshops: DID based on DLT for developing countries (5-9 July 2021), BDT; Vaccination certificate; Joint workshop with TC 307
- review of deliverables from other study groups, focus groups and other SDOs
| 7. | 15/17 | 17-18 June 2021 | e-meeting | - To address and discuss draft X.1712 (X.sec_QKDN_km) for consent
|
Tutorial SG17 overview TD3479 Statistics of participants- 231 participants (284 announced): 32 countries, 33 Sector Members, 2 Associates, and 3 Academia. 6 invited experts.
SG17 Correspondence Group/task force- tf-nsp-prep (Task Force on preparation for the next study period): terminated.
- CG-wtsa20-prep (Correspondence Group on SG17 preparation for WTSA-20): re-constituted
Meeting input and organization- Contributions: 104 – small decrease, DDP: 99%.
- APT 91.16 (88%) [China 49.33 (47%), Korea 31.5 (30%), Japan 9.33 (9%), India 1(1%)]
- Americas 4 (4%) [US 4]
- EUR 8.83 (8%) [France 0.83, UK 2, Germany 5, Russia 1]
- LAM (0), AFR (0), ARAB (0), RCC (0).
- LS: (matrix in TD3486)
- incoming 57 - stable
- Outgoing 17 - decreased
- TDs: 305 - decreased
Annex A Actions taken on Recommendations, and other texts at SG17 closing plenary on 30 April 2021a) TAP Recommendations approved (WTSA-16 Resolution 1):# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1. | 3/17 | X.1054rev | Information security, cybersecurity and privacy protection - Governance of information security | Rev | Jinghua Min, Thaib Mustafa, Anfona Traore | TD3652 | ISO/IEC 27014 | 2020-03 | 2021-04 | 2. | 6/17 | X.1811 (X.5Gsec-q) | Security guidelines for applying quantum-safe algorithms in 5G systems | New | Yanfei Guo, Zhiyuan Hu, Zhaoji Lin, Fuwen Liu, Min Zuo | TD3684 | | 2018-03 | 2021-04 | 3. | 10/17 | X.1252rev | Baseline identity management terms and definitions | Rev | Abbie Barbir, | TD3703 | | 2018-03 | 2021-04 |
b) TAP Recommendations not approved (WTSA-16 Resolution 1):none c) Corrigendum approved, Implementers' Guide agreed:The SG17 plenary meeting approved the following texts by agreement: # | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1. | 11/17 | Z. Imp100rev | Specification and Description Language implementer's guide – Version 4.0.1 | Rev | Rick Reed | TD3663 | | | 2021-04 | 2. | 15/17 | TR.sec-qkd.Cor | Corrigendum to Technical Report: Security considerations for quantum key distribution network | New | Matthieu Legre, Dong-Hi Sim, | TD3723 | | | 2021-04 |
d) Recommendation determined (TAP – WTSA-16 Resolution 1):# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent (e.g., ISO/IEC) | Start of work | Timing | -
| 4/17 | X.1233 (X.gcims) | Guidelines for countering spam over instant messaging | New | Huamin Jin, ChangOh Kim, Laifu Wang, Shuai Wang, Yanbin Zhang | TD3738 | | 2017-09 | 2021-04 |
e) AAP Recommendations consented for Last Call (Recommendation ITU-T A.8):The SG17 plenary meeting gave consent (AAP) to the following new/rev ITU-T Recommendations for Last Call according to Recommendation ITU-T A.8: # | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | | 1. | 3/17 | X.1061 (X.ciag) | Cyber insurance acquisition guideline for Information and Communication Technologies (ICT) services provider | New | Thai Mustafa, Ong Yew Seng | TD3710 | | 2019-01 | | 2021-04 | 2. | 3/17 | X.1060 (X.framcdc) | Framework for creation and operation of a cyber defence center | New | Arnaud Taddei | TD3721 | | 2018-03 | | 2021-04 | 3. | 11/17 | Z.100rev | Specification and Description Language – Overview of SDL 2010 | rev | Rick Reed | TD3584 | | | | 2021-04 | 4. | 11/17 | Z.100Annex F2-rev | SDL 2010 formal definition: Static semantics | rev | Rick Reed | TD3584 | | | | 2021-04 | 5. | 11/17 | Z.100Annex F3-rev | SDL-2010 formal definition: Dynamic semantics | rev | Rick Reed | TD3584 | | | | 2021-04 | 6. | 11/17 | Z.101rev | Specification and Description Language – Basic SDL 2010 | rev | Rick Reed | TD3584 | | | | 2021-04 | 7. | 11/17 | Z.102rev | Specification and Description Language – Comprehensive SDL-2010 | rev | Rick Reed | TD3584 | | | | 2021-04 | 8. | 11/17 | Z.103rev | Specification and Description Language – Shorthand notation and annotation in SDL 2010 | rev | Rick Reed | TD3584 | | | | 2021-04 | 9. | 11/17 | Z.104rev | Specification and Description Language – Data and action language in SDL-2010 | rev | Rick Reed | TD3584 | | | | 2021-04 | 10. | 11/17 | Z.105rev | Specification and Description Language – SDL 2010 combined with ASN.1 modules | rev | Rick Reed | TD3584 | | | | 2021-04 | 11. | 11/17 | Z.106rev | Specification and Description Language – Common interchange format for SDL 2010 | rev | Rick Reed | TD3584 | | | | 2021-04 | 12. | 11/17 | Z.107rev | Specification and Description Language – Object-oriented data in SDL 2010 | rev | Rick Reed | TD3584 | | | | 2021-04 | 13. | 14/17 | X.1406 (X.stov) | Security threats to online voting system using distributed ledger technology | New | Byoung-Moon Chin, ChangOh Kim, Keundug Park, Heung Youl Youm | TD3650 | | 2017-09 | | 2021-04 | 14. | 14/17 | X.1405 (X.str-dlt) | Security threats and requirements for digital payment services based on distributed ledger technology | New | Kyeong Hee Oh, ChangOh Kim, Preetika Singh | TD3668 | | 2017-09 | | 2021-04 |
f) Recommendations planned for action in SG17 Aug/Sep 2021 meeting:# | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1. | 2/17 | X.5Gsec-ecs* | Security framework for 5G edge computing services | New | Feng Gao, Jae Hoon Nah, Junjie Xia, Bo Yu, Xiaojun Zhuang | TD3743 | | 2019-01 | 2021-09 | 2. | 2/17 | X.5Gsec-guide* | Security guideline for 5G communication system | New | Mee Yeon Kim, Keundug Park, Heung Youl Youm | TD3651 | | 2019-01 | 2021-09 | 3. | 2/17 | X.5Gsec-netec* | Security capabilities of network layer for 5G edge computing | New | Chen Zhang, Feng Zhang | TD3708 | | 2019-09 | 2021-09 | 4. | 2/17 | X.5Gsec-t* | Security framework based on trust relationship in 5G ecosystem | New | Peng jin, Minpeng Qi , Junzhi Yan, Heung Youl Youm | TD3673 | | 2018-09 | 2021-09 | 5. | 2/17 | X.nsom-sec | Security requirements and architecture for network slice management and orchestration | New | Zhiyuan Hu, Huamin Jin, Ye Tao, Junzhi Yan | TD3690 | | 2019-09 | 2021-09 | 6. | 2/17 | X.rf pin | Guidelines for continuous protection of service access process | New | Chao Huang, Min Shu, Weilei Wang, Chen Zhang | TD3691 | | 2019-09 | 2021-09 | 7. | 4/17 | X.1246rev | Technologies involved in countering voice spam in telecommunication organizations | Rev | Dmitry Cherkesov, Yanbin Zhang | TD2838 | | 2019-09 | 2021-09 | 8. | 4/17 | X.1247rev | Technical framework for countering mobile messaging spam | Rev | Dmitry Cherkesov, Yanbin Zhang | TD2838 | | 2019-09 | 2021-09 | 9. | 4/17 | X.arc-ev | Security architecture for evaluation of technical vulnerabilities | New | Wei Li, Chen Zhang | TD3707 | | 2019-09 | 2021-09 | 10. | 4/17 | X.gcmms* | Guideline for countering multimedia messaging service spam | New | Jinfeng Kou, Zhaoji Lin, Wei Liu, Ye Tao | TD3696 | | 2018-09 | 2021-09 | 11. | 4/17 | X.tecwes | Technologies in countering website spoofing for telecommunication organizations | New | Ruzhen Hu, Meng Nan, Chen Zhang | TD3706 | | 2018-03 | 2021-09 | 12. | 4/17 | X.tsfpp* | Technical security framework for protection of users' personal information while countering mobile messaging spam | New | Feng Gao, Junjie Xia, Bo Yu, Chen Zhang, Yanbin Zhang | TD3145 | | 2018-04 | 2021-09 | 13. | 6/17 | X.sg-rat* | Security guidelines for use of remote access tools in Internet-connected control system | New | Gunhee Lee | TD3679 | | 2019-09 | 2021-09 | 14. | 6/17 | X.ssp-iot* | Security requirements and framework for IoT service platform | New | Hao Dong, Yanfei Guo, Lijun Liu, Jae Hoon Nah, Wenxin Wang, Junjie Xia | TD3713 | | 2018-03 | 2021-09 | 15. | 6/17 | X.strvms* | Security threats and requirements for video management system | New | Jong Wook Han, Geon Woo Kim, Kyungsoo Lim | TD3685 | | 2018-03 | 2021-09 | 16. | 7/17 | X.sgos | Security guidelines of web-based online customer service | New | Hao Dong, Lijun Liu, Jae Hoon Nah, Wenxin Wang | TD3712 | | 2018-03 | 2021-09 | 17. | 7/17 | X.websec-7 | Reference monitor for online analytics services | New | Hyungjin Lim, Jongyoul Park, Junjie Xia | TD3661 | | 2014-09 | 2021-09 | 18. | 8/17 | X.sgBDIP | Security guidelines for big data infrastructure and platform | New | Arnaud Taddei, Ye Tao, Laifu Wang | TD3689 | | 2018-03 | 2021-09 | 19. | 8/17 | X.sgcc | Security guidelines for container in cloud computing environment | New | Lanfang Ren, Ye Tao, Laifu Wang, Lei Xu | TD3699 | | 2018-09 | 2021-09 | 20. | 10/17 | X.b2m | Biology-to-machine protocol | New | Erik Andersen, John Caras, Myung Geun Chun | TD3654 | | | 2021-09 | 21. | 10/17 | X.upu* | UPU S68 Postal identity management framework | New | Gustavo Dama, Hiroshi Takechi | TD2507R1 | UPU S68 | | 2021-09 | 22. | 11/17 | X.672rev | Information technology - Open systems interconnection - Object identifier resolution system | Rev | Han Hongqiang, Linjian Song | TD3642R1 | ISO/IEC 29168-1 | | 2021-09 | 23. | 11/17 | X.509 Cor.1 | Information Technology - Open systems Interconnection - The Directory – Public-key and attribute certificate frameworks Cor. 1 | New | Erik Andersen | TD3764 | ISO / IEC 9594-8 Cor.1 | | 2021-09 | 24. | 11/17 | Z.161rev | Testing and Test Control Notation version 3: TTCN-3 core language | Rev | Dieter Hogrefe | | ETSI ES 201 873-1 | | 2021-09 | 25. | 11/17 | Z.161.2rev | Testing and Test Control Notation version 3: TTCN-3 language extensions: Configuration and deployment support | Rev | Dieter Hogrefe | | ETSI ES 202 781 | | 2021-09 | 26. | 11/17 | Z.161.3rev | Testing and Test Control Notation version 3: TTCN-3 language extensions: Advanced parameterization | Rev | Dieter Hogrefe | | ETSI ES 202 784 | | 2021-09 | 27. | 11/17 | Z.161.4rev | Testing and Test Control Notation version 3: TTCN-3 language extensions: Behaviour types | Rev | Dieter Hogrefe | | ETSI ES 202 785 | | 2021-09 | 28. | 11/17 | Z.161.7rev | Testing and Test Control Notation version 3: TTCN-3 language extensions: Object-Oriented Features | Rev | Dieter Hogrefe | | ETSI ES 203 790 | | 2021-09 | 29. | 11/17 | Z.167rev | Testing and Test Control Notation version 3: Using ASN.1 with TTCN-3 | Rev | Dieter Hogrefe | | ETSI ES 201 873-7 | | 2021-09 | 30. | 11/17 | Z.168rev | Testing and Test Control Notation version 3: The IDL to TTCN-3 mapping | Rev | Dieter Hogrefe | | ETSI ES 201 873-8 | | 2021-09 | 31. | 11/17 | Z.169rev | Testing and Test Control Notation version 3: Using XML schema with TTCN-3 | Rev | Dieter Hogrefe | | ETSI ES 201 873-9 | | 2021-09 | 32. | 11/17 | Z.171rev | Testing and Test Control Notation version 3: Using JSON with TTCN-3 | Rev | Dieter Hogrefe | | ETSI ES 201 873-11 | | 2021-09 | 33. | 14/17 | X.das-mgt | Security threats and requirements for the data access and sharing based on DLT | New | Mee Yeon Kim, Keundug Park, Heung Youl Youm | TD3726 | | 2018-03 | 2021-09 | 34. | 14/17 | X.srip-dlt* | Security requirements for digital integrity proofing based on distributed ledger technology | New | Jung Yeon Hwang, Yuhee Ki, Min Shu, Wenlei Wang, Yang Wu, Yunwei Zhao | TD3662 | | 2018-09 | 2021-09 | 35. | 14/17 | X.ss-dlt | Security services based on DLT | New | Zhaoji Lin, Ke Wang, Kai Wei Junjie Xia, Min Zuo | TD3716 | | 2017-09 | 2021-09 | 36. | 14/17 | X.tf-spd-dlt | Technical framework for secure software programme distribution mechanism based on distributed ledger technology | New | Feng Gao, Nan Jiang, Junjie Xia, Bo Yu | TD1926 | | 2018-03 | 2021-09 | 37. | 15/17 | X.1712 (X.sec-QKDN_km) | Security requirements and designs for quantum key distribution networks - key management | New | Kaoru Kenyoshi, Jiajun Ma, Hao Qin, Dong-Hi Sim | TD3760 | | 2019-01 | 2021-09 | 38. | 15/17 | X.tf-mpc | Technical guidelines for secure multi-party computation | New | Xiaoyuan Bai, Hong Cheng, Jung Yeon Hwang, Zhaoji Lin, Hongru Zhu | TD3643 | | 2019-09 | 2021-09 |
Note: * for TAP determination; g)Other texts (Technical Reports, Technical Papers, Supplements, Implementer's Guides, etc) planned for agreement in next SG17 Aug/Sep 2021 meeting # | Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 1. | 3/17 | CSC-X.sup | Supplement to X.1051: Critical security controls for telecommunication organization information and network security management in support of ITU-T X.1051 | New | Patrice Payen, Arnaud Taddei, Mustafa Thaib | TD3717 | | 2018-09 | 2021-09 | 2. | 4/17 | TR.cs-ml | Technical Report: Countering spam based on machine learning | New | Wei Liu, Ye Tao | TD3740 | | 2019-09 | 2021-09 | 3. | 8/17 | TR.XAAS (ex TR.fssvs) | Technical Report: Framework for security standardization for virtualized services | New | Mark McFadden | C1074 | | 2020-09 | 2021-09 |
Annex B New work itemsThe following new work items were agreed to be added to the SG17 Work Programme: # | Question | NWI | TD | Title | C | 1. | 2/17 | X.5Gsec-message* | TD3697 | Security Requirements for 5G Message Service | C1040 | 2. | 6/17 | TR.ibc-cd ** | TD3683 | Technical report: Guideline for identity-based cryptosystems used for cross-domain secure communications | C1064 | 3. | 7/17 | X.1144rev | TD2773 | eXtensible Access Control Markup Language (XACML) 3.0 | TD3769 | 4. | 7/17 | X.guide-cdd | TD3665 | Security guidelines for combining de-identified data using trusted third party | C1005 | 5. | 7/17 | X.sg-dtn | TD3676 | Security Guidelines for Digital Twin Network | C1052 | 6. | 7/17 | X.vide | TD3645 | Guideline of visual feature protection and secure sharing mechanisms for de-identification | C987 | 7. | 8/17 | X.gecds* | TD3701 | Guideline on edge computing data security | C1055 | 8. | 8/17 | X.sa-ec | TD3719 | Security architecture of edge cloud | C1065 | 9. | 8/17 | X.sgcnp* | TD3695 | Security guidelines for cloud native PaaS | C1069 | 10. | 10/17 | X.1251rev | TD3704 | A framework for user control of digital identity | C983 R1 | 11. | 15/17 | TR.hybsec-qkd ** | TD3667 | Technical Report: Overview of hybrid security approaches applicable to QKD | C990 | 12. | 15/17 | TR.sec-ai ** | TD3669 | Technical Report: Guidelines for security management of using artificualt intelligence technology | C1020 | 13. | 15/17 | TR.sec-qkd Cor. ** | TD3723 | Technical Report: Security considerations for quantum key distribution network | C1035 | 14. | 15/17 | X.sec_QKDN_AA | TD3675 | Authentication and authorization in QKDN using quantum safe cryptography | C1046 | 15. | 15/17 | X.sec_QKDN_CM | TD3725 | Security requirements and measures for quantum key distribution networks - control and management | C1045, C1000 |
Notes: *: for TAP determination, **: for agreement, others for consent
|
|
|
|
|