HT04 - Lawful Interception: Difference between revisions
Line 5: | Line 5: | ||
* Proofs of Concept(s) to show Lawful Interception capabilities in conjunction with NFV | * Proofs of Concept(s) to show Lawful Interception capabilities in conjunction with NFV | ||
Specifically in terms of the key issues for LI, we would like to see PoCs address the problem of providing a secure platform to host sensitive workloads. | |||
It is fundamental to the success of NFV that industry is able to offer viable solutions to these challenges. | It is fundamental to the success of NFV that industry is able to offer viable solutions to these challenges. | ||
NFV-critical functionality (for example LI) is dependent on both: | NFV-critical functionality (for example LI) is dependent on both: | ||
# Administrative isolation: creating two layers of administration functionality for a given workload+host combination, where no leakage of information from one layer to the other is possible. | # '''Administrative isolation:''' creating two layers of administration functionality for a given workload+host combination, where no leakage of information from one layer to the other is possible. | ||
# Secured execution: delivering confidentiality and integrity of instructions and data within an area of process space based on a hardware root-of-trust. | |||
# '''Secured execution:''' delivering confidentiality and integrity of instructions and data within an area of process space based on a hardware root-of-trust. | |||
[https://docbox.etsi.org/ISG/NFV/TSC/05-CONTRIBUTIONS/2015//NFVTSC(15)000043_SEC_WG_Hot_Topic__Lawful_Interception.docx HT#4 (SEC) Lawful Interception] | |||
= Status = | = Status = |
Revision as of 09:40, 12 August 2015
Description
Many regulatory authorities require operators to provide Lawful Interception capabilities. This Hot Topic aims to drive:
- Understanding the impact of virtualisation on the regulatory requirements of Lawful Interception
- Exploration of architectures and designs to allow Lawful Interception capabilities to be provided in NFV deployments
- Proofs of Concept(s) to show Lawful Interception capabilities in conjunction with NFV
Specifically in terms of the key issues for LI, we would like to see PoCs address the problem of providing a secure platform to host sensitive workloads.
It is fundamental to the success of NFV that industry is able to offer viable solutions to these challenges.
NFV-critical functionality (for example LI) is dependent on both:
- Administrative isolation: creating two layers of administration functionality for a given workload+host combination, where no leakage of information from one layer to the other is possible.
- Secured execution: delivering confidentiality and integrity of instructions and data within an area of process space based on a hardware root-of-trust.
HT#4 (SEC) Lawful Interception
Status
ACTIVE
What is expected to be learnt from the NFV PoCs
Points to prove/refute
- How does virtualisation impact the requirements for Lawful Interception?
- What impacts are there on NFV deployments in terms of:
- Performance
- Management
- Security
- What other impacts may exist?
Criterion of success
- Presentation of architectures to provide Lawful Interception capabilities that are acceptable to Law Enforcement Agencies and deployable by operators
Technical information to be provided by the PoC Team
- Description of how requirements in SEC009 are met
- Overall architecture and use case descriptions
- Specifics on the issues faced
- Specifics on the solutions provided
- Specifics on the lessons learnt
PoC Teams shall follow the HT#4 Feedback Template on their contributions to Hot Topic#4
Concerned WGs/WI
SEC WG: SEC004 - Lawful Interception Implications - Latest draft
SEC009 - Use cases and technical approaches for multi-layer host administration - Latest draft
Coordinator
SEC WG co-chair: Mike Bursell (Intel) mike.bursell@intel.com
Contributions (feedback) deadline
Q2 2016