<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-lu-cats-smam-security-01" category="info" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="SMAM for CATS">A mechanism of security monitoring and management for service resources in Computing-Aware Traffic Steering (CATS)</title>
    <seriesInfo name="Internet-Draft" value="draft-lu-cats-smam-security-01"/>
    <author initials="" surname="Lu" fullname="Li Lu" role="editor">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>luli@chinamobile.com</email>
      </address>
    </author>
    <author initials="M." surname="Chen" fullname="Meiling Chen">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>chenmeiling@chinamobile.com</email>
      </address>
    </author>
    <author initials="L." surname="Su" fullname="Li Su">
      <organization>China Mobile</organization>
      <address>
        <postal>
          <city>BeiJing</city>
          <country>China</country>
        </postal>
        <email>suli@chinamobile.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="24"/>
    <area>Security</area>
    <workgroup>Internet Engineering Task Force</workgroup>
    <keyword>Internet-Draft</keyword>
    <keyword>keyword2</keyword>
    <abstract>
      <?line 38?>

<t>This draft proposes a mechanism to realize monitoring and management of service resources.</t>
    </abstract>
  </front>
  <middle>
    <?line 42?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>As described in [I-D.ietf-cats-usecases-requirements], traffic steering that takes into account both the computing resource metric and network metric would improve the QoE of several services, e.g., AR/VR and intelligent transportation. But when executing services, efficiency is not the only factor to consider. Security requirements are important for users, service providers and network providers, such as following security requirements:</t>
      <artwork><![CDATA[
1. The services should not be interrupted abnormally, and data of services should not be leaked or unauthorized access;

2. The network should run stably and is not subject to attacks from service resources;

3. The service resources are prevented from being attacked by other resources.
]]></artwork>
      <t>Many resolutions need to be designed and applyed to fully meet security requirements above. But a basic resolution is to monitor and discover corrupted service resources and limit them from providing services and interact with network components as well as other service resources, and more secure service resources should be selected under same conditions. This draft proposes a mechanism to realize monitoring and management of service resources.</t>
    </section>
    <section anchor="problem-statement">
      <name>Problem statement</name>
      <t>Service resources face kinds of attacks from inside and outside. Successful attacks may bring security risks for services, such as service unavailable, service data stolen etc, and service resources may become attack tools to interfere activities of other computing resources and functional components in CATS if they are manipulated maliciously. The more vulnerable the resource, the greater the likelihood of being breached. And when service resources have been breached, they will be threats in network.</t>
      <t>For protecting service availability, security of services and maintaining network stability, computing resources in CATS should be in security status and services should run on reliable resources. So there should be a mechanism to monitor security status of service resources and discover the resources that are likely to be breached and those that have already been breached in CATS. Then different policies can be applyed for above service resources such as excluding the service resources from CATS or reduce usage of them.</t>
    </section>
    <section anchor="framework-and-components">
      <name>Framework and Components</name>
      <t>In [I-D.ldbc-cats-framework], a CATS framework for computing-aware traffic steering according to computing metrics of service resources and network metrics is proposed. In this draft, the new functional component C-SeMA is introduced based on the existing CATS framework.</t>
      <t>The CATS Security Metric Agent(C-SeMA) is responsible for collecting security information of computing resources that used to carry service instances. Computing resources could be servers, virtual machines or containers. Details of security information are listed in 5.2.</t>
      <t>The C-SeMA gathers the security information and decides the security status of the computing resources, then generates security policy according to the security status of computing resources and sends it to C-PS. C-PS could adjust resource selection policy according to the security policy.</t>
    </section>
    <section anchor="workflow">
      <name>Workflow</name>
      <section anchor="overview">
        <name>Overview</name>
        <t>Figure 2 shows the main workflow of monitoring and management of computing resources. Two stages are included in the workflow. In stage 1, C-SeMA acquire security information from computing resources or security functions. In stage 2, security policies will be generated according to security information and will be sent to C-PS. In stage 3, C-PS can select service nodes according to the security policies.</t>
        <artwork><![CDATA[
+-----------------+          +----------------+           +---------------+
|sefunction/      |          |                |           |               |
|service resources|          |    C-SeMA      |           |      C-PS     |
+--------+--------+          +--------+-------+           +--------+------+
         <----------------------------+                            |       
         |                            |                            |       
         |requirements of             |                            |       
         |security metrics            |                            |       
         |                            |                            |       
         +---------------------------->                            |       
         |security                    |                            |       
         |information                 |                            |       
         |                            |                            |       
         |                     processing of                       |       
         |                     security                            |       
         |                     information                         |       
         |                            ++---------------------------+       
         |                            |         security policy    |       
         |                            |                            |       
         |                            |                         service    
         |                            |                     decision-making
         |                            |                            |          
 
                                Figure1: overview of workflow
]]></artwork>
      </section>
      <section anchor="collection-of-security-information">
        <name>Collection of security information</name>
        <t>C-SeMA need to collect security capability information and security status information of computing resources. Security capability information indicates the security capabilities that are depolyed for protecting computing resources and services running on them from attacks. Security status information including predefined dynamic security metrics of computing resources, such as abnormal traffic, adnormal behaviors, and vulnerability situation etc. C-SeMA need to distribute requirements of security metrics to computing resources or security functions.</t>
        <t>C-SeMA collects security information from computing resources or security functions deployed in service sites or network. Different collection methods can be used, such as C-SeMA collects security information periodically or security function push the information when security status changes.</t>
        <t>Security information should be associated with a specific computing resource and is associated with service instances by computing resources. Table 1 shows the examples of security information for service resources.</t>
        <artwork><![CDATA[
+--------------+-----------------+---------------------+
| Types of     |    Security     |       Details       |
| security     |    metrics      |                     |
| information  |                 |                     |
+--------------+-----------------+---------------------+
|              |   Security      |                     |
|  Security    |   capabilities  |  Such as X-san      |
|  capability  |   of computing  |  , IPS, IDS and     |
|              |   resources     |  confidential       |
|              |                 |  computing etc      |
+--------------+-----------------+---------------------+
|              |                 |  Current            |
|              |   Vulnerability |  vulnerabilities in |
|              |   information   |  computing resources|
|              +-----------------+---------------------+
|              |                 |  Current virus      |
|              |   Virus         |  in computing       |
|              |   information   |  resources          |
|              +-----------------+---------------------+
|   Security   |                 |  Attack events      |
|   status     |   Attack        |  faced by computing |
|              |   information   |  resources          |
|              +-----------------+---------------------+
|              |                 | Abnormal behavior   |
|              |                 | information         |
|              |                 | of service resources|
|              |   Abnormal      | such as frequent    |
|              |   behavior      | submission of data, |
|              |   information   | single submission   |
|              |                 | of large amounts of |
|              |                 | data etc            |
+--------------+-----------------+---------------------+
        Table 1: examples of security information

]]></artwork>
      </section>
      <section anchor="processing-of-security-information">
        <name>Processing of security information</name>
        <t>C-SeMA sets classification rules for computing resources. The classification rules classify computing resources into different security priority according to security information, such as low, middle, high and disabled. C-SeMA generates initial priority of computing resources when receiving security information for the first time and adjust the priority when security information update.</t>
        <t>Two examples of classify rules are as following:</t>
        <artwork><![CDATA[
1. Rule 1: define rules of value assignment and weighs of every security metric. Then assign values to security metrics of computing resources according to received security information and the rules. And use method of weighting to compute the final security value. Security priority is decided by security value. Security policies will be determined according to the security priority;   

2. Rule 2: set classification criteria for every security priority, such as computing resources are divided into type of disabled if high risk vulnerabilities are found and are divided into type of high priority if specific security capabilities are available.
]]></artwork>
        <t>Examples of Initial priority of computing resources are as follows:</t>
        <artwork><![CDATA[
Suggests set the security priority of computing resources as low;
Suggests set the security priority of computing resources as middle;
Suggests set the security priority of computing resources as high;
Suggests set the security priority of computing resources as disabled.
]]></artwork>
        <t>C-SeMA processes the updated security information and determines the priority adjustment policy to allocate new priority for computing resources or service instances.</t>
        <t>The policies include but not limited to the following types:</t>
        <artwork><![CDATA[
Suggests to prohibit using the computing resources(such as high risk vulnerability is found);
Suggests to prohibit using the service instances;
Suggests to reduce the priority of the computing resources;
Suggests to reduce the priority of the service instances;
Suggests to prioritize the computing resources;
Enable the computing resources and assign a security priority;
None.
]]></artwork>
        <t>Specific decision logic is out of the scope of this draft.</t>
      </section>
      <section anchor="service-decision-making-based-on-security-information">
        <name>Service decision-making based on security information</name>
        <t>C-SeMA submits initial security priority and updated priority policies for specific computing resources or service instances to C-PS. C-PS could take security priority of computing resources as references and adjust selection policies when conducting service decision-making:</t>
        <artwork><![CDATA[
If C-SeMA suggests to prohibit specific computing resources/instances, C-PS excludes these computing resources/instances from alternative lists;
If C-SeMA suggests to enable specific computing resources, C-PS puts them into alternative lists;
C-PS selects computing resources/instances of higher security priority to provide service among computing resources/instances with same network and computing conditions.
]]></artwork>
      </section>
    </section>
    <section anchor="IANA">
      <name>IANA Considerations</name>
      <t>This memo includes no request to IANA.</t>
    </section>
    <section anchor="Security">
      <name>Security Considerations</name>
      <t>TBD</t>
    </section>
  </middle>
  <back>
    <?line 198?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
