<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.8 (Ruby 2.5.5) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-oiwa-secure-hybrid-network-00" category="info" submissionType="IETF">
  <front>
    <title abbrev="Securing hybrid network - criteria">Securing hybrid network - criteria</title>

    <author initials="Y." surname="OIWA" fullname="Yutaka OIWA">
      <organization>AIST Japan</organization>
      <address>
        <email>y.oiwa@aist.go.jp</email>
      </address>
    </author>

    <date year="2024" month="March" day="20"/>

    <area>General</area>
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 62?>

<t>This document analyzes current issues for ensuring and monitoring
the security status of the network used under complex network environment
such as hybrid cloud or mixed cloud settings.</t>



    </abstract>



  </front>

  <middle>


<?line 68?>

<section anchor="introduction"><name>Introduction</name>

<t>Recently, virtualized resources such as cloud computing infrastructure
rapidly replace traditional types of network/computing environment
such as local servers or on-premise computer clusters.
In such kind of infrastructure, information of physical resources 
such as servers, local network, network routers, etc. are hidden from
users in trade with flexibility, service redundancy and costs as well.
Cryptographic communications such as TLS, IPsec etc. are typically used to
protect communication into/out of such systems from eavesdropping and
tampering.</t>

<t>However, there are many use cases where service still depends on the
security nature of underlying physical resources, instead of just
encrypting the communication:</t>

<t><list style="symbols">
  <t>Traffic analysis on encrypted communication may reveal partial information
of the payload;</t>
  <t>Juridical requirement (such as personal data protection) demands some specific property (such as governing laws, geological positions, operators) to be checked;</t>
  <t>Denial-of-service and several other attacks may not be prevented by encryption only.</t>
</list></t>

<t>For such high-security applications, we need some technical
infrastructure for continuously checking the properties and statuses
of underlying network and intermediate nodes.  In non-virtualized,
self-managed setting, tHere are several existing technologies
(e.g. NETCONF, path validation, etc.) for acquiring such statuses.
However, these are not enough for virtualized, multi-stake-holder setting of
modern cloud infrastructure.</t>

<t>This document gives a first-stage problem analysis for ensuring and
monitoring the security status of the network used under complex
network environment such as hybrid cloud or mixed cloud settings.  It
also proposes a brief, straw-man view on the enabling architecture for
possible monitoring systems.</t>

<section anchor="conventions-and-definitions"><name>Conventions and Definitions</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
</section>
<section anchor="background"><name>Background</name>

<section anchor="multi-cloud-and-hybrid-cloud-systems"><name>Multi-cloud and hybrid cloud systems</name>

<t>Concepts of multi-cloud and hybrid clouds are defined in ISO/IEC
5140:2024; in short, multi-cloud is a system where a single service is
implemented using two-or-more independently-operated cloud services.
Hybrid cloud system composes two or more computation environments
having different nature of operation, security level or other aspects,
at least one of which is typically a public cloud service.  Often,
subsystems on privately-operated cloud, on-premise, or edge networks
are connected with public cloud infrastructure by network
to construct a single hybrid cloud system.</t>

<t>Hybrid cloud systems are, in general, constructed when the security or
other provisions of public cloud systems are not sufficient for a part
of information or a subsystem component (if not, a simple public or
multi cloud environment is sufficient).  At the same time, there are
often a requirement where some benefits (scalability, costs,
resilience, maintainability etc.) of public cloud systems are
beneficial (if not, simple on-premise deployment is enough).
This mixed, seemingly conflicting requirements makes it difficult
to ensure the monitoring of security for the hybrid cloud systems.</t>

</section>
<section anchor="security-implications-of-hybrid-clouds"><name>Security implications of hybrid clouds</name>

<t>Multi-cloud and hybrid cloud systems require system-internal
communications flowing beyond the boundary of single cloud systems.
In a simplest case, it can be implemented using authenticated TLS or
HTTPS communications via public Internet infrastructure.  For
high-security systems, it is often implemented using dedicated
channels of communications, such as VPNs, private peering, or even a
dedicated optical fiber channels.  To maintain the security of whole
systems, monitoring integrity of such dedicated channels is mandatory.</t>

<t>Furthermore, with IP-based software systems, there are lot more
dependency to ensure such secure communications.  In other words,
there are a lot more surfaces for attacks.  For example, if a DNS
recored is either tampered or misconfigured, a communication intended
to go through a secure channel might be routed to public channels.  If
there is a misconfiguration for routing, the traffic might go public.
Enumerating and collecting status of such dependency are undermined
currently.</t>

</section>
</section>
<section anchor="problem-statement"><name>Problem statement</name>

<t>There are a lot of technology already available and useful for
such purposes.</t>

<t><list style="symbols">
  <t>NASR activity (Network Attestation For Secure Routing)
provides capability for recording and monitoring the paths of
    network packets forwarding.</t>
  <t>SAVNET (Source Address Validation in Intra-domain and Inter-domain
Networks) provides a way to ensure validity of incoming traffic and
    possibly blocking any rogue packets.</t>
  <t>SRv6 provides a control of intended routes for individual IPv6
packets between networks.</t>
  <t>RPKI provides a control and trust anchors for the security
or inter-domain routing.</t>
</list></t>

<t>However, to ensure the security of the whole hybrid cloud
infrastructure, we still have to address the following aspects,
which seems to be lacking solutions currently.</t>

<section anchor="the-nature-of-multiple-operatorsstakeholders"><name>The nature of multiple operators/stakeholders</name>

<t>Hybrid cloud systems depends on a lot of resources which are not under
control of the application system operators.  Needless to say, public
clouds (both IaaS and SaaS) are operated by external service
providers.  They have their own policy for their operations, and they
have their own decisions for maintaining or replacing any of the
providing hardware/software resources, provided that their
service-level agreements (SLAs) is met.</t>

<t>This makes it non-satisfactory to expose information of all network
intermediate nodes to the final application operators.  First,
detailed information on design and implementation of the cloud
infrastructure is a confidential information and important properties of
the cloud providers.  Moreover, some extent of independence between
application operators (users or cloud infrastructure) and cloud
service providers are critical for maintaining cost effectiveness,
maintainability, security etc of the cloud services.</t>

</section>
<section anchor="determination-of-the-correct-states"><name>Determination of the "correct" states</name>

<t>In a small-scale, hand-crafted network, determining whether the
current running state of the network is intended or not is a
relatively simple question.  However, in the complex multi-cloud
systems, it is quite hard or even impossible problem to determine
that, even if we had been possible to know all the detail of
the running state of the whole global network.
To determine that, we also have to know about the design principle
and hidden assumption about the operation of each single network.</t>

</section>
<section anchor="shared-infrastructure-and-information-leakage"><name>Shared infrastructure and information leakage</name>

<t>The infrastructure of the cloud system is deeply shared among
several clients.  Although some information on the operational
status at cloud service side is required to check the reliability
of the user-side applications, exposing the raw operational
parameters to some client may reveal security-critical information
of other clients.  Before exposing the cloud-side status,
it must be cooked and filtered so that information only relevant
to a specific client is included.</t>

</section>
<section anchor="virtualized-infrastructure"><name>Virtualized infrastructure</name>

<t>Many cloud resources, not only computation nodes but also network
routers, switches, VPN endpoints, etc., are virtualized and provided
via infrastructure-as-code (IaC) systems.  Unlike physical routers
and switches, determination of virtual intermediate nodes in the
traffic path does not mean its physical locations, physical properties
and security natures.  (imagine how we can analyze results of
traceroute or ICMP ping via virtual private network.)</t>

<t>If there are any virtual nodes, physical properties of its underlying
infrastructure may have to be traced and checked to ensure security
and integrity.  This requires cooperation of virtual resource provider
or cloud providers and integration with their infrastructure
management systems.</t>

</section>
<section anchor="risks-beyond-network-layers"><name>Risks beyond network layers</name>

<t>Today, many network systems are managed via complex systems.  This
means any invasion to the IT-side assets of those management systems
will cause severe risks to the network layers.  These assets include
(and are not limited to) software asset management, software
vulnerability, ID managements, etc.</t>

<t>To correctly evaluate risks of the whole network operations, 
we must also care about the risks of these management systems as well.</t>

</section>
</section>
<section anchor="proposed-design"><name>Proposed design</name>

<t>To overcome these problems, we propose to design a distributed
architecture for assuring the network operation integrity for the
mixed and hybrid cloud applications.
Such a system should:</t>

<t><list style="symbols">
  <t>Have a modeling of the network infrastructure in two dimensions:
one axis in parallel to the network paths and forwarding
directions, and the other axis for the layers of protocols.</t>
  <t>Have enough knowledge on the complex dependency of software and
protocols; not only the network packet-forwarding technologies but
also surrounding areas such as addressing and DNS must be covered.</t>
  <t>Have explicit handling of tunneling and virtualization aspects,
both on protocol level (e.g. VPNs, IPIP, IPSec) and on
infrastructure level (IaC, Network-as-a-Service, Wavelength
Division Multiplexing, etc.)</t>
  <t>Consolidate operation information at each operator's level
and consider their pre-determined operation principles for
evaluating integrity.</t>
  <t>Address management-oriented risks of the infrastructure
managements, including non-network aspects.</t>
</list></t>

<t>Possible implementation of such a system might be
distributed systems of network security coordinations
between operators and users of cloud and network infrastructure.
Instead of the "disclose all" approach, 
such a design might keep both flexibility and efficiency of
the multi-cloud applications.</t>

<t>In particular, such a system will:</t>

<t><list style="symbols">
  <t>Have ability to state network security requirements
from an infrastructure user to infrastructure providers.
In a hybrid cloud or layered systems, it will include
communications between operators of infrastructure/cloud systems.</t>
  <t>Have ability to return assertions for the current provisional
status against given requirements.</t>
  <t>Provide some choices on the transparency levels about the
internals of cloud-service infrastructure.</t>
  <t>Have some traceability provisions for trouble shooting, 
if there are opacities in network status assertion replies.</t>
  <t>Have enough considerations on various tunneling and virtualization
technologies.</t>
  <t>Have a bidirectional interface to system-level security management
systems, such as Continuous Diagnostics and Mitigations (CDM)
dashboards.</t>
</list></t>

<t>Detailed designs will follow (TBD).</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>Security <bcp14>SHALL</bcp14> be deeply considered and discussed during the ongoing
standardization process.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document has no IANA actions.</t>

</section>


  </middle>

  <back>


    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>

<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>




    </references>



<?line 320?>

<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>

<t>This work is supported by NEDO grants P23013 from the Net Energy and
Industrial Technology Development Organization.</t>

</section>


  </back>

<!-- ##markdown-source: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-->

</rfc>

