Committed to connecting the world

  •  
ITU GSR 2024

ITU-T work programme

[2017-2020] : [SG17] : [Q6/17]

[Declared patent(s)]  - [Publication]

Work item: X.1333 (ex X.sg-rat)
Subject/title: Security guidelines for use of remote access tools in Internet-connected control systems
Status: Approved on 2022-01-07 
Approval process: TAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: -
Liaison: -
Supporting members: -
Summary: Remote access tools (RATs) are widely used on control systems for monitoring, control and maintenance to reduce maintenance costs and minimize the response time in the event of a malfunction. RATs provide the ability to manipulate control systems remotely, but at the same time, an insecure configuration of RATs and vulnerabilities in RATs could significantly increase the attack surface of control systems. The most serious problem is an interface to access a control system from the external networks that could make attackers access to control system from the Internet. The Recommendation describes a whole picture to employ RATs securely for monitoring, control and maintenance. In this Recommendation, threats to network configuration due to the use of RATs are identified and security guidelines are provided to adapt secure configuration and security measures for the use of RATs in Internet-connected control systems. Providing well-organized security controls on the use of RATs would be helpful for digital service providers operating control systems to reduce the attack surface and the threats from external networks. Moreover, it would be beneficial to align the security levels between developed and developing countries, since this is not a local problem, but a global problem. The Recommendation is intended to give a whole picture to securely employ RATs for monitoring, control and maintenance. In this Recommendation, threats to network configuration due to the use of RATs will be identified and security guidelines will also be provided to adapt secure configuration and security measures for the use of RATs in Internet-connected control systems. Providing well organized security controls on the use of RATs would be helpful for digital service providers operating control systems to reduce the attack surface and the threats from external networks. Moreover, it would be helpful to reduce the gaps of the security levels between developed countries and developing countries, since this is not a local problem, but a global problem.
Comment: -
Reference(s):
  Historic references:
Contact(s):
Gunhee Lee, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2019-09-12 16:23:37
Last update: 2022-01-19 16:55:06