<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-chen-atomized-security-functions-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.0 -->
  <front>
    <title abbrev="Security Functions">the Description and Definition for Atomic Security Functions</title>
    <seriesInfo name="Internet-Draft" value="draft-chen-atomized-security-functions-00"/>
    <author initials="" surname="Chen" fullname="Meiling Chen" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="08"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <t>At present, many security products are deployed in the network, and the security functions of security products overlap. Atomized security function refers to the smallest representation unit of security function, which cannot be split again and can be implemented by independent code. Atomized security functions can quickly and effectively assemble security capabilities and provide security services. It no longer takes security products as the unit, but atomic security functions as the basic unit, by reorganize and define the security functions supported by existing network devices then provide guidance for secure routing, finally, each security function will be uniformly coded.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>At present, there are many security companies and products on the market, the most common include firewall, vulnerability scanning system, intrusion detection system, intrusion prevention system, WEB application firewall, VPN, anti DDoS equipment.</t>
      <t>The equipment purchased by telecom operators takes security products as the basic unit to ensure the availability of the whole network; With the development of the network and the security transmission requirements of users, in addition to the availability of the network, it is also necessary to provide external security capabilities. The availability of the basic network has been in a stable state, but the ability to provide external security needs to be improved.</t>
      <t>Atomic security functions: it refers to the smallest unit that independently provides security capability in code implementation. The definition and classification of atomization security capabilities are based on IPDRR, IPDRR is the network security framework of the National Institute of Standards and Technology. Identify, protect, detect, respond, and recover (IPDRR) are the 5 high level functions of the framework core, there are 23 categories that are spread across these 5 functions. When different from the 23 categories, the definition and classification of atomic security capabilities start from the actual security products and aim at providing external security capabilities.</t>
    </section>
    <section anchor="security-functions">
      <name>Security functions</name>
      <t>At present, we refer to the IPDRR model to classify the capabilities of existing security products into 23 security capability categories. Of course, the fine granularity of this classification is not yet atomicized. We will atomicize the 23 security capability classifications and reflect them in Yang's model.</t>
      <section anchor="identity">
        <name>Identity</name>
        <t>Asset identification: through active detection and passive monitoring, identify the assets in the organization or network and their status changes, distinguish and classify their value and vulnerability in information security, and ensure the accuracy, real-time and consistency of assets. Typical products include asset management system, asset exploration platform, etc.</t>
        <t>Identity identification: identify and verify the identity of visitors to networks, systems, applications, etc. to establish trust in their identity, and find unauthorized behaviors that do not conform to their identity. Typical products include identification.</t>
        <t>Threat intelligence identification: identify the threat intelligence related to strategy, tactics and operations according to the rules or methods of threat intelligence identification. Typical products include advanced continuous threat detection products.</t>
        <t>Vulnerability identification: use appropriate vulnerability scanning tools, or organize penetration testing or vulnerability evaluation, to scan and identify possible security vulnerabilities in equipment and software, classify vulnerabilities, and verify whether vulnerability repair is successful. Typical products include vulnerability scanning systems.</t>
        <t>Configuration vulnerability detection: use configuration verification tools to scan and identify possible configuration vulnerabilities in equipment and software, so as to find and timely repair configuration problems. Typical security products include configuration verification system, configuration verification, etc</t>
      </section>
      <section anchor="protect">
        <name>Protect</name>
        <t>Access control: through information security level and information classification, restrict privileged access, complete the separation of access control functions (such as access request, access authorization, access management) and the management of authorization and authority of access request, and make it only access authorized networks, terminals and other resources to prevent unauthorized access. Typical products include firewalls, bastion computers, operation and maintenance security gateways, etc.</t>
        <t>Security interface protection: set interface security call conditions, disable or restrict unnecessary functions and interfaces. Typical products include baseline configuration check products.</t>
        <t>Encryption protection: provide password management, password operation and other password functions to provide confidentiality, tamper resistance, and non repudiation protection for files, communication links, etc. Typical products include cryptographic devices, commercial encryptors, encryption cards, and public key infrastructure.</t>
        <t>Malware protection: use black and white list to prevent unauthorized software use. Typical products include anti-virus products.</t>
        <t>Isolated exchange: by cutting off the network connection and stripping the network protocol, the data is ferried between different networks in the form of proprietary data blocks to achieve data exchange in a network isolated environment. Typical products include gateways, security isolation and information exchange systems.</t>
        <t>Flow control: monitor network flow, limit bandwidth, filter messages and other operations, optimize the use of loan resources, and avoid network congestion. Typical products include Web application firewall, Web application security protection system, anti DDoS attack, etc</t>
        <t>Data desensitization: based on desensitization rules such as data masking, data simulation, replacement of key parts, and random replacement of data, the sensitive data is transformed to achieve data hiding, deformation, and fuzziness. At the same time, the desensitized data can maintain the original semantics and association relationships, and ensure the validity of the data while preventing the leakage of model sensitive information. Typical products include data desensitization, etc</t>
        <t>Active defense: hide real assets or lure attackers to attack virtual targets through simulation, dynamic or static permutation and combination, deformation, transformation or confusion to achieve the security protection of real assets. Typical products include honeypot, deception defense, pseudo security products, mobile target defense products, etc.</t>
        <t>Security environment support: Follow specific security policies in the design, implementation and use phases to provide a trusted computing module, a secure operating system and other security environments or enhance environment security. Typical products include secure operating systems, secure databases, trusted execution environments, etc</t>
        <t>Residual information protection: Completely destroy the bearing data to be deleted on the storage media through overwriting, isolation, etc., to prevent the data leakage caused by unauthorized recovery of the deleted sensitive data, and to ensure that other data are not affected. Typical products include data clearing, etc</t>
      </section>
      <section anchor="detect">
        <name>Detect</name>
        <t>Security monitoring: Collect and gather information such as network traffic, terminal information, online behavior, email information, and network assets, and provide on-demand or continuous monitoring. Typical products include network activity monitoring, etc.</t>
        <t>security analysis: analyze the network traffic, network behavior, terminal behavior, logs and other data with a reproducible and descriptive method, find out the abnormal and threatening behaviors, and determine the attack means and evaluate the attack loss. Typical products include public opinion analysis, security detection analysis, intrusion detection system, etc.</t>
        <t>Security audit: identify, record, store and analyze information related to security activities, so that the organization can know whether its security activities meet the requirements of security compliance, and at the same time, it can help the organization fully understand and master the effectiveness, adequacy and suitability of its security activities. Typical security products include code audit, log audit, behavior audit, flow audit, comprehensive audit, etc.</t>
        <t>system risk assessment: provide semi-automatic or automatic risk assessment for the system, with the purpose of improving system security. Typical security products include system risk assessment services.</t>
      </section>
      <section anchor="respond">
        <name>Respond</name>
        <t>Security orchestration: Integrate third-party tools across security and business ecosystems through scripts to achieve triage and coordination of security events and collaborative response to security events. Typical security products include security orchestration and automated response.</t>
        <t>Attack mitigation: for viruses, trojans, worms, network attacks, data leaks, e-mail attacks and other events, use alarm, anti-virus, process termination and other means to block, limit or pull the attackers or leak sources, so as to mitigate the expansion of events, reduce and eliminate the impact.</t>
        <t>Attack traceability: for general exceptions in the network system, security events without results, and security events with clear results (leakage, destruction) after serious damage, trace the source of infection, infection path, infection object and other information of tampering, destruction, latency and other attacks.</t>
      </section>
      <section anchor="recover">
        <name>Recover</name>
        <t>Backup and recovery: In order to cope with unexpected situations such as loss or damage of files and data, two or more sets of systems with the same functions can be established for files and data copies exported from the original system and stored separately. Health status monitoring and function switching can be performed between them. When one system stops working unexpectedly, it can be switched to another system to ensure that all functions and services of the system are normal. It can be divided into data backup and recovery, website backup and recovery, disaster recovery auxiliary support, configuration rollback, etc.</t>
      </section>
    </section>
    <section anchor="yang-model-for-atomic-security-functions">
      <name>Yang Model for Atomic security functions</name>
      <t>TBD</t>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>







  </back>
  <!-- ##markdown-source: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-->

</rfc>
