<?xml version="1.0" encoding="US-ASCII"?>
<!-- edited with XMLSPY v5 rel. 3 U (http://www.xmlspy.com)
     by Daniel M Kohn (private) -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.RFC.2119.xml">
]>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes"?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>
<rfc category="std" docName="draft-si-service-mesh-dta-00" ipr="trust200902">
  <front>
    <title>Dynamic Trust Security Architecture for Distributed Service
    Mesh</title>

    <author fullname="Xuan Si" initials="X" surname="Si">
      <organization>China Telecom</organization>

      <address>
        <postal>
          <street>Kangqiao Town, Pudong New District</street>

          <city>Shanghai</city>

          <region>Shanghai</region>

          <code>201315</code>

          <country>China</country>
        </postal>

        <email>six1@chinatelecom.cn</email>
      </address>
    </author>

    <date day="30" month="January" year="2025"/>

    <area>Service Mesh</area>

    <keyword>Internet-Darft</keyword>

    <abstract>
      <t>This document proposes a Service Mesh Dynamic-Trust Architecture
      (SM-DTA) to address security risks in dynamic service-to-service
      communication within distributed service mesh environments. The
      architecture is applicable to scenarios such as elastic service scaling
      and cross-domain service invocation. SM-DTA enforces end-to-end security
      governance through service identity authentication, dynamic
      context-aware policy engines, and data sovereignty proxies.</t>
    </abstract>
  </front>

  <middle>
    <section anchor="intro" title="Introduction">
      <t>1)Dynamic Service Instances Challenge Traditional Trust Models</t>

      <t>In distributed systems based on service mesh, the ephemeral nature of
      service instances (e.g., minute-scale lifecycle of Kubernetes Pods)
      leads to frequent changes in network identifiers (e.g., IP addresses).
      Traditional static trust models relying on IP/port-based mechanisms
      (e.g., firewall rules, VPN allowlists) struggle to maintain effective
      policies during service scaling or failover events, resulting in
      over-privileged access or service disruptions. Perimeter-centric
      defenses fail to adapt to the dynamic topology of east-west traffic
      between services.</t>

      <t>2)Lack of Unified Security Governance for East-West Traffic</t>

      <t>In service mesh environments, inter-service communication (e.g.,
      east-west traffic) typically bypasses traditional perimeter security
      devices (e.g., gateway firewalls), creating fragmented security
      controls. Existing solutions (e.g., static RBAC policies) lack awareness
      of real-time context (e.g., health status of source services, time
      sensitivity) and fail to enforce end-to-end encryption. Attackers may
      exploit unencrypted plaintext communications or outdated policies to
      laterally penetrate critical services.</t>

      <t>3)Cross-Boundary Data Transmission Faces Sovereignty Risks</t>

      <t>In hybrid cloud or multi-cluster scenarios, sensitive data (e.g.,
      user credentials, transaction records) must flow across network
      boundaries, but current mechanisms lack granular protection
      capabilities. Plaintext transmission and static masking rules expose
      risks to man-in-the-middle attacks or data leakage, while centralized
      encryption gateways become performance bottlenecks and single points of
      failure. The absence of data lineage tracking capabilities further
      complicates compliance auditing.</t>
    </section>

    <section title="Conventions used in this document">
      <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
      "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
      document are to be interpreted as described in <xref target="RFC2119"/>
      .</t>
    </section>

    <section title="Architecture Goals">
      <section title="Continuous Identity Verification &amp; Dynamic Trust Anchors">
        <t>Assign unique cryptographic identities to service instances via
        automated certificate management, with strong binding to service
        characteristics (e.g., microservice name, container labels). The
        verification process eliminates dependencies on IP addresses/ports,
        enabling dynamic trust evaluation at the service-instance level to
        address trust anchor failures caused by ephemeral instances.</t>

        <t>To address the challenges of ephemeral service instances, the
        architecture establishes a robust identity framework by strongly
        binding service identities to infrastructure metadata (e.g.,
        microservice names, container labels). Automated certificate
        management ensures short-lived certificates (&le;24-hour validity) are
        issued and rotated seamlessly, eliminating reliance on static
        IP/port-based trust models. Real-time cryptographic signature
        validation further secures service interactions, dynamically verifying
        identities even as instances scale or migrate, thereby mitigating
        risks of trust anchor failures.</t>
      </section>

      <section title="Context-Driven Least-Privilege Access">
        <t>Deploy a multi-dimensional policy engine to dynamically generate
        least-privilege rules. Access grants depend on real-time context
        (request time, service load, vulnerability status) rather than static
        role attributes, ensuring strict alignment between privileges and
        current risk posture.</t>

        <t>The policy engine enforces granular access control by continuously
        aggregating contextual attributes such as service health metrics,
        request sensitivity tags, and environmental states. Leveraging a
        multi-dimensional risk assessment matrix, it dynamically generates
        least-privilege rules tailored to real-time conditions (e.g., service
        load, vulnerability status). This approach ensures privileges align
        strictly with current risk postures, automatically triggering actions
        like privilege degradation or circuit-breaking during anomalies (e.g.,
        excessive request rates), thereby minimizing over-provisioned
        access.</t>
      </section>

      <section title="Cross-Boundary Data Sovereignty">
        <t>Enforce sovereignty controls throughout the data lifecycle
        (transit, processing, storage) to prevent cross-domain leakage of
        sensitive information via granular data governance.</t>

        <t>To safeguard sensitive data across hybrid or multi-cluster
        environments, the architecture integrates lightweight tagging with
        dynamic masking rules that adapt to data classification labels (e.g.,
        PII, Confidential). Privacy-preserving techniques, such as partially
        homomorphic encryption, enable secure processing of encrypted data in
        transit and at rest. Distributed audit logs and lineage tracking
        systems ensure compliance with sovereignty regulations (e.g., GDPR),
        providing end-to-end visibility into data flows while preventing
        unauthorized cross-domain leakage.</t>
      </section>
    </section>

    <section title="Technical Design">
      <t>In this draft, we defined a Dynamic Trust Security Architecture for
      Distributed Service Mesh. The architecture consists of three core
      components (Figure 1):</t>

      <t><figure>
          <artwork align="center">
+---------------------------------------------------------------+
|                        Control Plane                          |
|                                                               |
|  +---------------------+         +---------------------+      |
|  |  Identity Provider  |&lt;--(1)---| Certificate Issuance|      |
|  | (Issuance/Rotation) |--------&gt;| &amp; Rotation          |      |
|  +---------------------+         +----------+----------+      |
|                                             |                 |
|  +---------------------+         +----------v----------+      |
|  |     Policy Rules    |&lt;--(2)---|     Policy Engine   |      |
|  | (Static Definitions)|         | (Dynamic Evaluation)|      |
|  +---------------------+         +----------+----------+      |
|                                             |                 |
|  +---------------------+         +----------v----------+      |
|  |      Audit Logs     |&lt;--(3)---|  Audit &amp; Compliance |      |
|  | (Raw Event Storage) |         |(Aggregation/Reports)|      |
|  +---------------------+         +---------------------+      |
+---------------------------------------------------------------+
                              | (4) Policy Distribution
                              | (5) Revocation Sync
                              v
+---------------------------------------------------------------+
|                         Data Plane                            |
|                                                               |
|  +---------------------+         +---------------------+      |
|  |    Sidecar Proxy    |&lt;--(4)---|    Crypto Module    |      |
|  | (Traffic Intercept) |         |  (mTLS Handshake)   |      |
|  +----------+----------+         +-----------+---------+      |
|             |                                 |               |
|  +----------v----------+         +-----------v---------+      |
|  |  Encrypted Traffic  |         |  Context Collector  |      |
|  | (Data Transmission) |---(6)--&gt;|(Metadata Extraction)|      |
|  +---------------------+         +-----------+---------+      |
|                                                |              |
|  +---------------------+         +------------v--------+      |
|  |   Dynamic Masking   |&lt;--(7)---| Data Classification |      |
|  | (Sensitive Fields)  |         | (Tagging &amp; Analysis)|      |
|  +---------------------+         +---------------------+      |
+---------------------------------------------------------------+

            Figure 1: Architecture Overview</artwork>
        </figure></t>
    </section>

    <section title="Key Mechanisms">
      <section title="Service Identity Binding">
        <t>SM-DTA establishes a cryptographically verifiable identity
        framework for ephemeral service instances. Each service instance is
        assigned a globally unique UUID, while critical metadata (e.g., owning
        team, deployment environment, domain affiliation) is embedded in a
        certificate. A centralized certificate authority (CA) automates the
        issuance and rotation of short-lived certificates, ensuring
        credentials remain time-bound and minimizing exposure from compromised
        keys. Revoked certificates are propagated in real-time across the
        service mesh control plane, enabling immediate enforcement of trust
        boundaries.</t>
      </section>

      <section title="Dynamic Access Control">
        <t>Dynamic Access Control leverages a context-aware policy engine to
        enforce least-privilege access. The engine evaluates requests against
        a multi-dimensional risk matrix, incorporating attributes such as:</t>

        <t><figure>
            <artwork align="center">+--------------------------+---------------------+  
| Context Attribute        | Example Values      |  
+--------------------------+---------------------+  
| Request time             | 09:00-18:00         |  
| Source service health    | CPU &lt; 80%, no CVE   |  
| Data sensitivity level   | PII, Confidential   |  
+--------------------------+---------------------+           </artwork>
          </figure></t>

        <t>Access decisions dynamically adapt to real-time conditions - for
        instance, granting access only if the service identity is valid, the
        request occurs within an authorized time window, and the source
        environment matches the destination. Policy violations trigger
        automated responses such as privilege degradation or service
        isolation.</t>
      </section>

      <section title="Data Protection">
        <t>Data Protection ensures end-to-end security for sensitive
        information. Inbound plaintext requests undergo dynamic masking (e.g.,
        replacing credit card numbers with ****-****-****-1234) based on
        predefined classification labels. The data is then encrypted using
        mTLS for full-path protection, preventing eavesdropping or tampering
        during transit. The workflow is illustrated below:</t>
      </section>
    </section>

    <section title="Security Considerations">
      <t>The east-west traffic of service mesh lacks end-to-end encryption,
      making it vulnerable to man-in-the-middle attacks or traffic
      eavesdropping. This exposes service-to-service communications in
      plaintext, allowing attackers to intercept sensitive data or inject
      malicious payloads. Additionally, sidecar proxies may become single
      points of attack; if the proxy components contain vulnerabilities or
      misconfigurations, attackers could hijack traffic, steal cryptographic
      keys, or even bypass the control of the policy engine.</t>
    </section>
  </middle>

  <back>
    <references>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement
          Levels</title>

          <author initials="S." surname="Bradner"/>

          <date month="March" year="1997"/>
        </front>
      </reference>
    </references>
  </back>
</rfc>
