<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lu-cats-smam-security-00" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.2 -->
  <front>
    <title abbrev="SMAM for CATS">A mechanism of security monitoring and management for service resources in Computing-Aware Traffic Steering (CATS)</title>
    <seriesInfo name="Internet-Draft" value="draft-lu-cats-smam-security-00"/>
    <author initials="" surname="Lu" fullname="Li Lu" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>luli@chinamobile.com</email>
      </address>
    </author>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2024" month="October" day="18"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 38?>

<t>The goal is to This draft proposes a mechanism to realize monitoring and management of service resources.</t>
    </abstract>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As described in [I-D.ietf-cats-usecases-requirements], traffic steering that takes into account both the computing resource metric and network metric would improve the QoE of several services, e.g., AR/VR and intelligent transportation. But when executing services, efficiency is not the only factor to consider. Security requirements are important for users, service providers and network providers, such as following security requirements:</t>
      <artwork><![CDATA[
1. The services should not be interrupted abnormally, and data of services should not be leaked or unauthorized access;

2. The network should run stably and is not subject to attacks from service resources;

3. The service resources are prevented from being attacked by other resources.
]]></artwork>
      <t>Many resolutions need to be designed and applyed to fully meet security requirements above. But a basic resolution is to monitor and discover corrupted service resources and limit them from providing services and interact with network components as well as other service resources, and more secure service resources should be selected under same conditions. This draft proposes a mechanism to realize monitoring and management of service resources.</t>
    </section>
    <section anchor="problem-statement">
      <name>Problem statement</name>
      <t>Service resources face kinds of attacks from inside and outside. Successful attacks may bring security risks for services, such as service unavailable, service data stolen etc, and service resources may become attack tools to interfere activities of other computing resources and functional components in CATS if they are manipulated maliciously. The more vulnerable the resource, the greater the likelihood of being breached. And when service resources have been breached, they will be threats in network.</t>
      <t>For protecting service availability, security of services and maintaining network stability, computing resources in CATS should be in security status and services should run on reliable resources. So there should be a mechanism to monitor security status of service resources and discover the resources that are likely to be breached and those that have already been breached in CATS. Then different policies can be applyed for above service resources such as excluding the service resources from CATS or reduce usage of them.</t>
    </section>
    <section anchor="framework-and-components">
      <name>Framework and Components</name>
      <t>In [I-D.ldbc-cats-framework], a CATS framework for computing-aware traffic steering according to computing metrics of service resources and network metrics is proposed. In this draft, the new functional component C-SeMA is introduced based on the existing CATS framework.</t>
      <t>The CATS Security Metric Agent(C-SeMA) is responsible for collecting security information of computing resources that used to carry service instances. Computing resources could be servers, virtual machines or containers. Details of security information are listed in 5.2.</t>
      <t>The C-SeMA gathers the security information and decides the security status of the computing resources, then generates security policy according to the security status of computing resources and sends it to C-PS. C-PS could adjust resource selection policy according to the security policy.</t>
    </section>
    <section anchor="workflow">
      <name>Workflow</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>Figure 2 shows the main workflow of monitoring and management of computing resources. Two stages are included in the workflow. In stage 1, C-SeMA acquire security information from computing resources or security functions. In stage 2, security policies will be generated according to security information and will be sent to C-PS. In stage 3, C-PS can select service nodes according to the security policies.</t>
        <artwork><![CDATA[
+-----------------+          +----------------+           +---------------+
|sefunction/      |          |                |           |               |
|service resources|      -   |    C-SeMA      |           |      C-PS     |
+--------+--------+          +--------+-------+           +--------+------+
         <----------------------------+                            |       
         |                            |                            |       
         |requirements of             |                            |       
         |security metrics            |                            |       
         |                            |                            |       
         +---------------------------->                            |       
         |security                    |                            |       
         |information                 |                            |       
         |                            |                            |       
         |                     processing of                       |       
         |                     security                            |       
         |                     information                         |       
         |                            ++---------------------------+       
         |                            |         security policy    |       
         |                            |                            |       
         |                            |                         service    
         |                            |                     decision-making
         |                            |                            |          
 
                                Figure2: overview of workflow
]]></artwork>
      </section>
      <section anchor="collection-of-security-information">
        <name>Collection of security information</name>
        <t>C-SeMA need to collect security capability information and security status information of computing resources. Security capability information indicates the security capabilities that are depolyed for protecting computing resources and services running on them from attacks. Security status information including predefined dynamic security metrics of computing resources, such as abnormal traffic, adnormal behaviors, and vulnerability situation etc. C-SeMA need to distribute requirements of security metrics to computing resources or security functions.</t>
        <t>C-SeMA collects security information from computing resources or security functions deployed in service sites or network. Different collection methods can be used, such as C-SeMA collects security information periodically or security function push the information when security status changes.</t>
        <t>Security information should be associated with a specific computing resource and is associated with service instances by computing resources. Table 1 shows the examples of security information for service resources.</t>
        <artwork><![CDATA[
+--------------+-----------------+---------------------+
| Types of     |    Security     |       Details       |
| security     |    metrics      |                     |
| information  |                 |                     |
+--------------+-----------------+---------------------+
|              |   Security      |                     |
|  Security    |   capabilities  |  Such as X-san      |
|  capability  |   of computing  |  , IPS and IDS etc  |
|              |   resources     |                     |
+--------------+-----------------+---------------------+
|              |                 |  Current            |
|              |   Vulnerability |  vulnerabilities in |
|              |   information   |  computing resources|
|              +-----------------+---------------------+
|              |                 |  Current virus      |
|              |   Virus         |  in computing       |
|              |   information   |  resources          |
|              +-----------------+---------------------+
|   Security   |                 |  Attack events      |
|   status     |   Attack        |  faced by computing |
|              |   information   |  resources          |
|              +-----------------+---------------------+
|              |                 | Abnormal behavior   |
|              |                 | information         |
|              |                 | of service resources|
|              |   Abnormal      | such as frequent    |
|              |   behavior      | submission of data, |
|              |   information   | single submission   |
|              |                 | of large amounts of |
|              |                 | data etc            |
+--------------+-----------------+---------------------+
        Table 1: examples of security information

]]></artwork>
      </section>
      <section anchor="processing-of-security-information">
        <name>Processing of security information</name>
        <t>C-SeMA processes the received security information and determines the corresponding security policies for specific computing resources or service instances according to predefined decision rules.</t>
        <t>Two examples of decision rules are as following:</t>
        <artwork><![CDATA[
1. Rule 1: Predefine rule of value assignment and weighs of every security metric. Then assign values to security metrics according to received security information and the rules. And use method of weighting to compute the final security value. Security policies will be determined according to the final value;   

2. Rule 2: Set trigger rules of every kind of policy, such as if high risk vulnerabilities are found in computing resources, then priority of the corresponding resources should be reduced.
]]></artwork>
        <t>Specific decision logic is out of the scope of this draft.</t>
        <t>The policies include but not limited to the following types:</t>
        <t>1 Suggests to prohibit using the computing resources;</t>
        <t>2 Suggests to prohibit using the service instances;</t>
        <t>3 Suggests to reduce the priority of the computing resources;</t>
        <t>4 Suggests to reduce the priority of the service instances;</t>
        <t>5 Suggests to prioritize the computing resources;</t>
        <t>6 Suggests to enable the computing resources;</t>
        <t>7 None.</t>
      </section>
      <section anchor="service-decision-making-based-on-security-information">
        <name>Service decision-making based on security information</name>
        <t>C-SeMA submits the policies for specific computing resources or service instances to C-PS. C-PS could take these policies as references and adjust selection policies when conducting service decision-making. According to different policies, operations of C-PS include but not limited to the following types:</t>
        <artwork><![CDATA[
1. If C-SeMA suggests to prohibit specific computing resources/instances, C-PS excludes these computing resources/instances from alternative lists;

2. If C-SeMA suggests to reduce the priority of specific computing resources/instances, C-PS selects other computing resources/instances to provide service under the same network and computing conditions;

3. If C-SeMA suggests to prioritize specific computing resources/instances, C-PS selects these computing resources/instances to provide service among computing resources/instances with same network and computing conditions;

4. If C-SeMA suggests to enable specific computing resources, C-PS puts them into alternative lists;
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 202?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
