security wg report of the fall 2004 meeting
Download
Skip this Video
Download Presentation
Security WG: Report of the Fall 2004 Meeting

Loading in 2 Seconds...

play fullscreen
1 / 14

Security WG: Report of the Fall 2004 Meeting - PowerPoint PPT Presentation


  • 204 Views
  • Uploaded on

Security WG: Report of the Fall 2004 Meeting. November 19, 2004 Howard Weiss. Meeting Agenda. 16 Nov 2004 0900-0915 : Welcome, opening remarks, logistics, agenda bashing 0915-0930 : Review results of Spring 2004 SecWG meeting in Montreal (Spring 2004 SecWG Report)

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Security WG: Report of the Fall 2004 Meeting' - sammy


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
security wg report of the fall 2004 meeting

Security WG:Report of the Fall 2004 Meeting

November 19, 2004

Howard Weiss

meeting agenda
Meeting Agenda
  • 16 Nov 2004
    • 0900-0915: Welcome, opening remarks, logistics, agenda bashing
    • 0915-0930: Review results of Spring 2004 SecWG meeting in Montreal (Spring 2004 SecWG Report)
    • 0930-1000: Security Architecture Document Discussions
    • 1000-1030: coffee break
    • 1030-1200: Security Architecture Document Discussions, cont
    • 1200-1330: Lunch
    • 1330-1500: Revised Security Green Book review/discussions
    • 1500-1530: coffee break
    • 1530-1700: Threat Document review/discussions
  • 17 Nov 2004
    • 0900-1200: New business
      • Review of mandatory security section in CCSDS documents (SLE documents) (SLE Security Section)
      • Crypto standard
      • Integrity Standard
      • Authentication Standard
      • Key Management
      • Future Documents (e.g., Threat Guide, Mission Planning Guide, Security Framework)
executive summary
Executive Summary
  • Attendees from CNES, BNSC, NASA/GSFC, DLR, ESA (ESTEC), NASA/JPL
  • Discussed and revised the SecWG documents in process:
    • Security Architecture
    • Threat
    • Revised Green Book
  • Discussed the success and first use of the “mandatory security section” for CCSDS documents
  • Discussed the Montreal proposals for CCSDS standards for:
    • Encryption
    • Authentication/integrity
    • Key Management
summary of goals and deliverables
Summary of Goals and Deliverables
  • Complete the final revisions to the Security Green Book and submit to CESG for approval.
  • Revise the Security Architecture document.
  • Complete the final revisions of the Threat Document and submit to the CESG for approval.
  • Propose a CCSDS encryption standard.
  • Propose a CCSDS authentication standard.
  • Think about proposals for a CCSDS key management standard.
  • Work with other WGs with respect to security.
progress achieved
Progress Achieved
  • Agreed on a common set of example mission classes to be used across all SecWG documents.
  • Agreed upon changes to the Security Architecture document.
  • Reviewed comments from MOIMS and ESTEC on the Threat Dcoument
    • Agreed to incorporation of revisions and submission to CESG upon revision completion.
  • Reviewed the use of the mandatory security section by the SLE Red Books
  • Reviewed the low level security standards proposed at Montreal :
    • Encryption
      • AES-128
    • Authentication/Integrity
      • Digital Signature Standard (DSS)
    • National sensitivities to the use of these standards does not appear to be a problem
    • However, it was decided that we should not simply write a book defining a CCSDS standard based on an existing standards without first profiling the standard for use within the space community, implementing it, and testing it.
  • Agreed to further study key management
  • Met with SLS at SLS plenary
    • Provided overview of current and future SecWG activities
    • SLS wants more attention paid to physical layer security (e.g., spread spectrum, frequency hopping, etc) but needs requirements.
open issues
Open Issues
  • Key management proposal
  • Policy framework
    • E.g., NIST document could be leveraged but will take resources to adapt for CCSDS. Resources not available at present.
  • Ground systems
    • Security for the ground system
    • Interconnection/policy for cross support across ground systems
  • Future documents – resources to tackle them
    • Common Criteria Protection Profiles
    • Security Handbook for Mission Planners
action items
Action Items
  • Update Security Architecture based on WG comments (Kenny)
  • Revise and submit Security Green Book to CESG (Weiss)
  • Provide a paragraph for the Security Green Book annex on the use of 3DES in ATV (Aguilar)
  • Revise, distribute to WG, and submit to CESG the revised Threat Document (check “manned space” security mechanisms wrt ISS) (Weiss)
  • Prepare key management white book proposal (Kenny)
    • Public key techniques
    • Identity-based techniques
    • Key update techniques
  • Ensure continued interaction with DTN program (Weiss)
  • Search for existing documents (e.g., NIST) as a starting point for an Information Security Mission Planning Guide (Sigman, Weiss)
  • Search for existing samples of connection agreements within respective Agencies for beginnings of Security Policy Framework document (Weiss, Sigman, Aguilar)
  • Write proposal to CESG for “proper” resources for development of encryption and authentication standards.
resource problems
Resource Problems
  • Resources are adequate to perform the initial tasks.
  • It has not yet been determined if resources are adequate to accomplish all the work currently on the schedule. However, ESA has provided representation from ESTEC and has stated that they will add another person from ESOC! But the question will be, what percentage of time will be provided?
    • Currently, many SecWG members have only very small fractions of their time dedicated to CCSDS.
risk management update
Risk Management Update
  • It is still unclear if enough resources are available from the Agencies to perform the necessary jobs but things are looking much brighter now than in the past. But…
cross area wg bof issues
Cross Area WG / BOF Issues
  • Security is a cross-cutting discipline that needs to be included in many other Areas and WGs. In the plenary, we asked that the CESG be alerted that other Areas and WG should request support from the Security WG (in addition to the SecWG being proactive). We believe that the mandatory security section in documents will force the other Areas and WG to seek out help!
  • Met with SLS on security
    • SLS concerned with physical layer security
      • What are the requirements?
      • Realizes that SecWG does not have physical layer expertise
    • Also concerned with security interoperability requirements
      • Do we have any interoperability requirements?
    • SLS wants to continue to have joint meetings with SecWG
resolutions to be sent to cesg and then to cmc
Resolutions to be Sent to CESG and Then to CMC
  • This resolution was proposed in Montreal – but no feedback. This should be amended per the discussions in Toulouse to ensure that not only a profile is written, but that it is implemented and tested within a space environment before being sent through the CCSDS standards track:
    • Resolution to the CESG to have the SecWG create a CCSDS security recommendations blue book, with the first standards being:
      • Proposal for a profile for an encryption standard based on FIPS 197 specification of AES-128
      • Proposal for a profile for an authentication/integrity standard based on FIPS 186-2 specification of the Digital Signature Standard.
new working items new bofs etc
New Working Items, New BOFs, etc.
  • Encryption recommendation.
  • Authentication recommendation.
  • Key Management recommendation.
ad