The Ngoss Security Principles
The Ngoss Security Principles
TMF 053S
Member Evaluation
Version 1.0
January 2004
NOTICE
The TeleManagement Forum (“TM Forum”) has made every effort to ensure that the contents of this document
are accurate. However, no liability is accepted for any errors or omissions or for consequences of any use made
of this document.
This document is a draft working document of TM Forum and is provided to its members solely for formal
comments and evaluation. It is not a Forum Approved Document and is solely circulated for the purposes of
assisting TM Forum in the preparation of a final document in furtherance of the aims and mission of TM Forum.
Any use of this document by the recipient is at its own risk. Under no circumstances will TM Forum be liable for
direct or indirect damages or any costs or losses resulting from the use of this document by the recipient.
Members of TM Forum are granted limited copyright waiver to distribute this document within their companies.
They may not make paper or electronic copies for distribution outside their companies. The only purpose of the
provision of this draft document to members is for making formal comments thereon to TM Forum.
This document may involve a claim of patent rights by one or more TM Forum members, pursuant to the
agreement on Intellectual Property Rights between TM Forum and its members, and by non-members of TM
Forum.
ACKNOWLEDGMENTS
The TeleManagement Forum would like to acknowledge the contribution made to this effort by the following
people:
TM Forum Documents
The NGOSS Security Principles Specifications Annex (TMF053S) to the NGOSS Technology Neutral Architecture
Specification (TMF 053) is being issued as Member Evaluation Version 1.0.
The purpose of an Evaluation Version is to encourage input based on experience of members and the public as
they begin to use the document. Following the Evaluation Period, documents that are seen to deliver value are
candidates for formal approval by the TM Forum. All documents approved by the TM Forum undergo a formal
review and approval process.
This document will continue under formal change control. Further work will be reflected in revisions to this
document.
Revision History
Time Stamp
This version of the NGOSS Security Principles Specification, TMF 053S Version 1.0, can be considered valid until
December 2004.
If the document version has only been released to members for review and comment, the document can be
downloaded from the Members Only area of the TM Forum Web Site.
Paper versions can be made available for a small fee to cover copying, mailing and handling. If you would like a
paper version of this document, please order via the TM Forum Web Site or contact the TM Forum office. If you
are not a member, please contact the TM Forum office on +1 973-292-1901.
TABLE OF CONTENTS
Time Stamp............................................................................................................................................................ 4
1 Introduction....................................................................................................................................................... 10
4.3 Insertion..................................................................................................................................................... 18
5 Threat Analysis................................................................................................................................................. 19
6 Detailed controls............................................................................................................................................... 22
Assurance requirements............................................................................................................................... 22
6.1 ........................................................................................................................................................................ 22
7 References ....................................................................................................................................................... 30
LIST OF FIGURES
PREFACE
• Agreeing on information that needs to flow from one process activity to another
• Identifying a realistic systems environment to support the interconnection of operational support systems
• Enabling the development of a market and real products for integrating and automating telecom operations
processes
The members of TM Forum include service providers, network operators and suppliers of equipment and
software to the communications industry. With that combination of buyers and suppliers of operational support
systems, TM Forum is able to achieve results in a pragmatic way that leads to product offerings (from member
companies) as well as paper specifications.
1.1 Background
Today, customers and stakeholders’ security awareness and expectations are growing. It is crucial to deal with
new challenging requirements for providing a secure NGOSS system.
For a long time, the security of Network Operations and Management Systems was taken for granted, mainly
because of the two following assumptions:
2. The Management Network is dedicated, well demarcated, and protected against access from the outside
But customers are less and less inclined to consider these assumptions as sufficient in order to claim to have a
secure System. In recent RFPs or RFIs, customers explicitly asked not to make such security assumptions and
therefore clearly requested some security features to be included from vendors’ solutions.
This document explains why the two assumptions listed above are not sufficient anymore to make a claim of
Management System security and, as a result, why NGOSS security is an issue that must be tackled. This
document will also provide the infrastructure, concepts and requirements for a secure NGOSS system.
This section provides an overview of the Structure of the NGOSS architecture. Rather than providing a
comprehensive look into the architecture (as provided by the TMF053 series of NGOSS Technology Neutral
Architecture (TNA) documents), it is meant to provide a quick look at and definition of the key NGOSS
architecture structural parts. For further details, interested readers should refer to the various TMF documents
listed in the References at the end of this document.
As illustrated in figure 1, The NGOSS architecture specifies the following layered approach:
An NGOSS system must be characterized by the usage of a common information model for enabling integration
and interoperability. The information model is designed to be more than just a standard representation of data – it
also defines semantics and behavior of, and interaction between, managed entities. This set of information, all
provided in a standard representation using standard data types is used to describe domain information (e.g.,
orders, network service and configuration definitions) in an NGOSS system.
Security Model:
The NGOSS system architecture is defined as a policy-enabled management architecture. Policy rules are
defined to meet business, system, or other objectives; consequently, policies may link one or more of the
business, system (operational), and implementation views of the NGOSS system to each other.
An NGOSS system should be composed of defined services that can be orchestrated using scripting/process
management technologies. An NGOSS system is further characterized by externalized descriptions of behavior
expressed in a technology-neutral manner.
An OSS Business service provides services that support the business-related functionality of the NGOSS
architecture, such as billing, rating and discounting, network data management, and others. OSS Business
Services deployed in an NGOSS solution are characterized as follows:
Integrated Legacy Applications are software components that were developed outside the scope of
NGOSS architecture and that have subsequently been made available as NGOSS components.
Framework Services:
These services provide the functionality to implementations of the architecture for correctly operating. Interfaces
to these services are provided through appropriate contract specifications and can be further split into two sub
classes:
These Services provide standard OSS/BSS capabilities whose functionality is common to many
OSS/BSS services and which can be orchestrated by those OSS/BSS Services. Examples of OSS
Framework Services include: Logging Services, Tracing Services, etc.
These Services provide the capabilities needed to support the patterns of interaction between
Components implementing Business Services. The Basic Framework Services may also be used by the
other Services. The Basic Framework Services are not optional. Each NGOSS deployment must include
at least one instance of each of the Distribution and Transparency Services that comprise the Basic
Framework Services.
The TNA Distribution and Transparency Services are NGOSS Technology Neutral Architecture
framework level services that are fundamental to the construction, deployment and use of
solutions in an NGOSS environment. An instance of each Service must be included in each
NGOSS deployment. D&T Framework Services include:
• Naming: to shield prospective users from the complexities (and inherent
incomprehensibility) of network addresses
• Repositories (or registry services): Store and provide information about available
distributed services
• Registration Services: Provide for the administration of services including the addition,
modification and removal of services from the Repository, and the ability to browse
services previously added to the Repository
• Service Location Services: Facilitate “matchmaking” between potential clients and
servers. These Services accept requests for a particular service from potential clients
and match that request against registered providers for that service stored in the
Repository.
Federation Model:
There are generally two types of methods of federating systems services and data: either by
providing a communications protocol between services providing similar functions (Service Level
Federation), or by providing mechanisms by which the underlying data (both system and user)
can be shared (Repository Level Federation).
Basic Mechanisms:
These Mechanisms provide the baseline functionality which must be implemented in any NGOSS deployment to
provide for the inter-working between independently deployed Components and to support the “plug-and-work”
paradigm at the most fundamental level.
3.1 Overview
The design of the NGOSS security architecture aims to provide a basis for stakeholders to architect, deploy, test
and operate an NGOSS environment in a secure manner. Although the macro-level objectives for security
(ultimately; business function and continuity) are common to all entities, it should be noted that each stakeholder
type may have a unique requirement or philosophy pertaining to function and at certain times these requirements
may be disjoint. Security is a cyclical process of assessment of need, planning of solutions, implementation of
solutions and monitoring. The stakeholders will ultimately choose the level of security necessary to maintain
respective business value, but at a minimum the guidelines within this document shall relate a common and
standard set of principles and practices from which to start.
A useful framework for the purposes of this document is a model relating subjects to objects in the context of
major security attributes (or goals) commonly utilized in the discussion of security:
Security Context
• Confidentiality • Integrity
This is model is commonly referred to as the “security context” of a particular element, operator or activity.
In the NGOSS standards, subjects could be people or software controls acting upon objects such as network
elements or services. Each NGOSS framework specification or recommendation shall be required to clearly state
the method by which it achieves security by highlighting its behavior against each security context.
3.2 Objectives
The macro-level goals of the NGOSS security architecture common to all stakeholders are:
a) To ensure that confidential information generated by or relating to a user is adequately protected against
misuse or misappropriation;
b) To ensure that the organizations and their employees are adequately protected form internal and external
threats when operating an NGOSS environment;
c) To ensure that there are clear lines of responsibility between entities, both inter and intra company, so that
liability for resources and services can be attributed and accounted for;
d) To ensure that the resources and services provided by networks and environments are adequately
protected against misuse or misappropriation;
e) to ensure that the level of protection afforded to users and providers of services follows the best practices
of the telecommunications industry available;
f) To ensure that the implementation of NGOSS security features and mechanisms can be extended and
enhanced as required by new threats and services.
g) To ensure OA&M and FCAPS functions perform as expected within the appropriate security context.
It is certain that each stakeholder constituency will have unique security goals (examples provided in the following
table) and will place different values on security context elements, relative to the economic value of the service or
product.
4 Security Threats
The first step in designing security architecture is to perform a detailed threat and threat analysis in order to
define the possible attacks against which the system must be protected. The threat analysis must consider every
component of the system and all interactions between functional components. In this section, we list several kinds
of threats that must be considered.
Confidentiality
Availability 5 4 6 2 Integrity
7 1. Eavesdropping
2. Alteration
3. Insertion
4. Service Hijacking
5. Denial of Service
6. Masquerade
7. Fraud
Attribution
4.1 Eavesdropping
Eavesdropping is a form of attack wherein an unauthorized user seeks to gain knowledge from or about a system
component by intercepting system communications. This can be done using such techniques as wiretapping or
man-in-the-middle attacks. Encryption can be used to prevent eavesdropping.
4.2 Alteration
Alteration is when an attacker manages to make unauthorized changes to files and components in the system. A
major concern with this type of attacks is its possibility to render the intrusion detection systems useless by
altering their policy rules or changing selected log files. And by changing or erasing log files for example, it
becomes impossible to trace the attacker’s activity in the system.
4.3 Insertion
The insertion of malicious code or replacement of a systems’ module with another that contains a Trojan horse or
malicious code is a common type of this threat. Attacker can also insert false entries into log files, add new users,
or add extra privileges to a user on the system. Checksums and encryption techniques can be helpful against this
type of attacks.
4.6 Masquerade
A masquerade attack consists in posing as an authorized user in order to obtain unauthorized services or
otherwise compromise the security of system components. Strong authentication is a protection against
masquerade attacks.
4.7 Fraud
Fraud is generally an attack against the economic interests of the network administration. Authentication,
authorization, message authenticator codes, digital signatures, encryption, audits, and security logs all help
protect against fraud.
5 Threat Analysis
3.1.1 Access Registration Service access control Component Designer must have write
access to the Registry authenticated,
and these credentials presented to the
Registration Service
3.1.3 Access Client access control The Component Designer will have
registered the Prospective Client and
assigned it an Access Control List
allowing it to perform the minimum
necessary actions.
3.1.4 Access Client access control The Prospective Client will present its
credentials to the Access Control
Function to be authenticated.
3.2.1 Authorizat Contract Type access control The Registration Server will only allow
ion administration of Contract Type(s) that
the Component Designer’s credentials
allow him to access
3.3.1 Denial of An attacker sends Uninstall messages to Component modification messages shall
Service a legitimate component in order to be authenticated and integrity protected
disrupt service using cryptographically generated digital
signatures.
3.3.2 Denial of An attacker modifies the Component to Component modification messages will
Service disable the use of that component by be authenticated and integrity protected
legitimate users cryptographically generated digital
signatures.
3.3.3 Denial of An attacker registers multiple Contract The System will allow the System
Service Types in order to Deny Service to Administrator to set limits on the number
legitimate users of Contract Instances that may be
registered for a user. In order to fully
control the balance between service
availability and fraud control the System
Administrator will need to continually
monitor and adjust these limits.
3.3.4 Denial of An attacker modifies the Contract Type Contract Type modification messages
Service to disable the use of that contract type by shall be authenticated and integrity
legitimate users protected using cryptographically
generated digital signatures.
3.3.5 Denial of An attacker intercepts a Contract Type Contract Instantiation messages shall be
Service message and modifies elements of the authenticated and integrity protected
message in order to gain services or using a cryptographically generated
deny service to legitimate users. This digital signature. The System
might be done in a symmetric fashion in Administrator will need to maintain an
order to satisfy message integrity or audited list of Component Designers who
message encryption. are allowed to Instantiate Contract
Types.
3.3.6 Denial of An attacker acts as a service Clients using services must verify the
Service (Advertising Contract Instances) and signatures on advertised contracts and
advertises services in order to capture have a process of specifying those
legitimate clients and deny service to signatures that will be acceptable.
legitimate services
3.3.7 Denial of An attacker requests multiple services The system will allow the System
Service (Contract Instances) in order to fill up the Administrator to set limits on the number
matching service capacity and deny of services an individual may request. In
service to others order to fully control the balance between
service availability and fraud control the
System Administrator will need to
continually monitor and adjust these
levels.
3.3.8 Denial of An attacker intercepts a Contract It is important that the messages to and
Service Instance message and modifies from the registry for advertising contract
elements of the message in order to gain instances are integrity protected. It is
services or deny service to legitimate proposed that these messages are
users. This might be done in a symmetric signed using a cryptographically
fashion in order to satisfy message generated digital signature protocol.
integrity or message encryption.
3.3.10 Denial of The Registration Service must be able to Where the Registration service is
Service identify and block particular sources of available outside a trusted network, it will
Contract Type registrations that may be be required to have devices to filter the
attempting to block legitimate access to connections to deny access to particular
the Registration Service resources (Firewalls). It may also be
required to have systems examining
connections to look for anomalous
behavior (Intruder Detection Systems).
3.3.11 Denial of Removal of a Contract Type thus The System Integrator must have
Service causing all Contract Instances of that authorization and follow the business
type to be unavailable rules (policy) for deprecating this
Contract Type
3.3.12 Denial of The Registration Service should have Where the Registration service is
service sufficient capability to quickly drop and available outside a trusted network, it will
filter requests to prevent DoS attacks be required to have devices to filter the
connections to deny access to particular
sources (Firewalls). It may also be
required to have systems examining
connections to look for anomalous
behavior (Intruder Detection Systems).
3.4.1 Disaster The failure of a significant part of the The NGOSS system and its components
Recovery NGOSS infrastructure. will be implemented in a manner to allow
for replication of the data across multiple
physical devices at multiple locations to
allow for the operation of a resilient
system.
3.5.1 Eavesdro The connections between the The process of connecting to the
pping Registration Service, the Registry and Registration service or the Registry will
the Component designer shall be establish an encrypted session if the
encrypted authentication procedure is successful.
3.6.1 Fraud A legitimate user sets up many Contract The controls on the number and type of
Instances and is then unable to pay for Contract Instances that a user can
the services used. establish will be limited. The system
Administrator and the Fraud department
will need to continually monitor and
adjust these levels.
3.6.2 Fraud An attacker sets up as a legitimate user The controls on the number and type of
and then sets up as many Contract Contract Instances that a user can
Instances as possible with no intention to establish will be limited. The system
pay for the services Administrator and the Fraud department
will need to continually monitor and
adjust these levels.
3.7.1 Service An attacker installs a component in order Component Designer must have write
Hijack to disrupt, or misappropriate service access to the Registry authenticated,
and these credentials presented to the
Registration Service
3.7.2 Service A Contract Type is Registered by an The Registration Server will only allow
Hijack attacker that is trying to capture services registration of Contract Type(s) that the
from legitimate users Component Designer’s credentials allow
him to register.
3.7.3 Service An attacker sets up a Contract Instance The Component Designer must have
Hijack that mimics a legitimate Contract authenticated rights to use the Contract
Instance and captures legitimate Type identifier.
connections to a service.
6 Detailed controls
This section is based on the International Standards Organization (ISO) security standard and the International
Engineering consortium [ISO/IEC 15408] also known as Common Criteria. The aim is to put the specific controls
required by the NGOSS standard into this framework. Organizations or Companies already adopting this
standard will then have a simple task of integrating NGOSS security environment into their existing security
controls.
EAL2 requires the co-operation of the developer in terms of the delivery of design information and test results, but
should not demand more effort on the part of the developer than is consistent with good commercial practice. As
such it should not require a substantially increased investment of cost or time.
EAL2 is therefore applicable in those circumstances where developers or users require a low to moderate level
of independently assured security in the absence of ready availability of the complete development record. Such
a situation may arise when securing legacy systems, or where access to the developer may be limited.
EAL2 (see next figure) provides assurance by an analysis of the security functions, using a functional and
interface specification, guidance documentation and the high-level design of the TOE, to understand the security
behavior. The analysis is supported by independent testing of the TOE security functions, evidence of developer
testing based on the functional specification, selective independent confirmation of the developer test results,
strength of function analysis, and evidence of a developer search for obvious vulnerabilities (e.g. those in the
public domain).
EAL2 also provides assurance through a configuration list for the TOE, and evidence of secure delivery
procedures. This EAL represents a meaningful increase in assurance from EAL1 by requiring developer testing, a
vulnerability analysis, and independent testing based upon more detailed TOE specifications.
CM capabilities (ACM_CAP)
ACM_CAP CM capabilities
The capabilities of the CM system address the likelihood that accidental or unauthorized modifications of the
configuration items will occur. The CM system should ensure the integrity of the TOE from the early design stages
through all subsequent maintenance efforts.
Unique identification of the configuration items leads to a clearer understanding of the composition of the TOE,
which in turn helps to determine those items which are subject to the evaluation requirements for the TOE.
Dependencies:
No dependencies.
ADV_HLD.1.5C The high-level design shall identify any underlying hardware, firmware, and/or software
required by the TSF with a presentation of the functions provided by the supporting protection
mechanisms implemented in that hardware, firmware, or software.
ADV_HLD.1.6C The high-level design shall identify all interfaces to the subsystems of the TSF.
ADV_HLD.1.7C The high-level design shall identify which of the interfaces to the subsystems of the TSF are
externally visible.
AGD_ADM.1Administrator guidance
Dependencies:
ADV_FSP.1 Informal functional specification
While the testing objective is to cover the TSF, there is no requirement to provide anything to verify this assertion
other than an informal mapping of tests to the functional specification and the testing data itself.
n this component the developer is required to show how the tests that have been identified correspond to the TSF
as described in the functional specification. This can be achieved by a statement of correspondence, perhaps
using a table. This information is required to support the evaluator in planning the test program for the evaluation.
At this level there is no requirement for complete coverage of every aspect of the TSF by the developer, and the
evaluator will need to take account of any deficiencies in this area.
Dependencies:
ADV_FSP.1 Informal functional specification
ATE_FUN.1 Functional testing
The objective is for the developer to demonstrate that all security functions perform as specified. The developer is
required to perform testing and to provide test documentation.
Dependencies:
No dependencies.
This component contains a requirement that the evaluator has available test results from the developer to
supplement the program of testing. The evaluator will repeat a sample of the developer’s tests to gain confidence
in the results obtained. Having established such confidence the evaluator will build upon the developer’s testing
by conducting additional tests that exercise the TOE in a different manner. By using a platform of validated
developer test results the evaluator is able to gain confidence that the TOE operates correctly in a wider range of
conditions than would be possible purely using the developer’s own efforts, given a fixed level of resource. Having
gained confidence that the developer has tested the TOE, the evaluator will also have more freedom, where
appropriate, to concentrate testing in areas where examination of documentation or specialist knowledge has
raised particular concerns.
Dependencies:
ADV_FSP.1 Informal functional specification
AGD_ADM.1 Administrator guidance
AGD_USR.1 User guidance
ATE_FUN.1 Functional testing
A vulnerability analysis is performed by the developer to ascertain the presence of obvious security vulnerabilities,
and to confirm that they cannot be exploited in the intended environment for the TOE.
The evaluator should consider performing additional tests as a result of potential exploitable vulnerabilities
identified during other parts of the evaluation.
Dependencies:
ADV_FSP.1 Informal functional specification
ADV_HLD.1 Descriptive high-level design
AGD_ADM.1 Administrator guidance
AGD_USR.1 User guidance
AVA_VLA.1.1C The documentation shall show, for all identified vulnerabilities, that the vulnerability cannot
be exploited in the intended environment for the TOE.
7 References
[ALSEC19] Alcatel Security Note 19, “Protecting Network Management Systems”, ALCATEL, Nov 2002
[CCISD] “Using the Common Criteria in Information System Security Design”, Proceedings of the 13th
Annual Canadian Information Technology Security Symposium, 2001
[eTOM] GB921: eTOM – the Business Process Framework, version 2.6, The TeleManagement Forum,
March 2002.
[ISO17799] ISO/IEC 17799:2000, “Information technology -- Code of practice for information security
management”, September 2001
[ISO/IEC 15408:1999] Common Criteria V. 2.1 (CC)
[SID] GB922: Shared Information/Data (SID) Model: Concepts, Principles, Business Entities, and Model
Addenda v1.5
[TMF053] TMF 053: The NGOSS™ Technology Neutral Architecture Specification. The
TeleManagement Forum, version 3.0, April 2003.
[TMF053A] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex A: Glossary. The
TeleManagement Forum, 2001.
[TMF053B] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex B: Contract
Specification. The TeleManagement Forum, 2001.
[TMF053C] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex C: Behavior and
Control Specification. The TeleManagement Forum, 2001.
[TMF053D] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex D: Metamodel
Specification. The TeleManagement Forum, 2001.
[TMF053F] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex F: Distributed
Transparency Services Specification. The TeleManagement Forum, 2001.
[TMF053M] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex M: Process
Management Specification. The TeleManagement Forum, 2001.
[TMF053N] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex N: Naming
Conventions. The TeleManagement Forum, 2001.
[TMF053P] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex P: Policy
Specification. The TeleManagement Forum, 2001.
[TMF053U] TMF 053: The NGOSS™ Technology Neutral Architecture Specification; Annex U: Use Cases.
The TeleManagement Forum, 2001.