Title: Session 5: Securing Home Networks Conclusions
1Session 5Securing Home Networks Conclusions
Recommendations
- Koji NAKAO
- KDDI General Manager, Information Security
Department
- ko-nakao_at_kddi.com
2Presentations in Session
- Securing Home Networks
Tsutomu Matsumoto
- Standardized Firewall Management An
IPCable2Home Perspective
Amol Bhagwat
- Home Network Device Authentication
Ralph Brown
- Standardized Precabling, the Efficient Road to
secure and reliable Home Networks
Walter P. von Pattay
3Highlights from Presentation 1Securing Home
Networks
- The allowed computational complexity or the cost
for mechanisms to enhance security may be highly
limited
- Often the appliances DO NOT have their
Identifiers in digital form
- Key Management
- including Key Establishment, Key
Revocation, and Key Renewal needs Innovative
Technologies
- How to achieve acceptable Quality of Security in
such a tough environment
4Highlights from Presentation 2Standardized
Firewall Management An IPCable2Home
Perspective
- IPCable2Home requires the firewall to have SPF or
ASP filtering capabilities.
- Is session aware, keeps track of initiated vs.
response packets.
- Supports remote configuration by service provider
as well as consumer configuration
- Uses standardized configuration language
- Need of the Management of Firewall
- IPCable2Home standardizes configuration and
management of firewalls including in the home
gateway
5Highlights from Presentation 3Home Network
Device Authentication
- Device authentication is more than just the
protocols and cryptography used in devices
- For device authentication to have value it must
be backed by
- Detailed specifications
- License agreements
- Certification processes
- Certification authority
- Certification issuance
- For exchanging high value content, these elements
become even more important
6Highlights from Presentation 4Standardized
Precabling, the Efficient Road to secure and
reliable Home Networks
- Reasons for cabling (secure, safe, reliable)
- Standardization in SC25 ISO/IEC 11801 is
world-widely used.11801 Generic cabling for
customer premises
- ISO/IEC 15018 (Cabling Infrastructure)
- This decreases the cost for protection against
sabotage, masquerade and malfunctions.
7Overview of issues in the session(1)Threads in
Home Network
8Overview of issues in the session(2)Security
Requirements
a) confidentiality the property that information
is not made available or disclosed to
unauthorized individuals, entities, or processes
(ISO 7498-21988). b) integrity the property of
safeguarding the accuracy and completeness of
assets. c) availability the property of being ac
cessible and usable upon demand by an authorized
entity (ISO 7498-21988). d) accountability the
property that ensures that the actions of an
entity may be traced uniquely to the entity (ISO
7498-21988). e) authenticity the property that
ensures that the identity of a subject or
resource is the one claimed. Authenticity applies
to entities such as users, processes, systems and
information. f) Reliability the property of cons
istent intended behavior and results.
9Recommendations
Devices
Users
(a)Confidentiality(b)Integrity(c)Availability(d
)Authenticity(e)Reliability
Remote Users
ExternalNetworkThe Internet
HomeGW
(a)(c)(d)
(a)(c)(d)
(a)(b)(c)(d)
(d)
(d)
10Follow-up actions Security Management
- Identify and classify home assets
- Risk analysis and assessment are required
- Select suitable controls for the assets in order
to reducethe risks
- Implement the controls
- Review and Check the controls implemented in a
constanttime period
- If additional risks are recognized, then action
against the risks should be carried out.
- Security Management Process Plan-Do-Check-Act
11Conclusion Good quality of security
- Vulnerability and threads should be identified
for HN
- Risk assessment should be carried out for HN
- Study and standardize Specific Controls, such
asFirewall, Intrusion Detections System
(IDS),Device authentication,
- Collaboration with External standardization
bodies such as ISO,IETF should be strongly
promoted
- Good and acceptable standardshould be promptly
carried out
- Security Management is necessary.
Continuous improvement
Refine Actions
Policy
Action
Review Audit
Plan
Plan
Implement Operation
Check
Do