<?xml version="1.0" encoding="iso-8859-1"?>
<!--
     vim: set softtabstop=2 shiftwidth=2 expandtab
     version=20150108
-->
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<?rfc strict="no" ?>
<?rfc toc="yes"?>
<?rfc tocompact="yes"?>
<?rfc tocdepth="3"?>
<?rfc tocindent="yes"?>
<?rfc symrefs="yes"?>
<?rfc sortrefs="yes" ?>
<?rfc comments="yes"?>
<?rfc inline="yes"?>
<?rfc compact="yes"?>
<?rfc subcompact="no"?>

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!ENTITY RFC7491 SYSTEM "http://xml.resource.org/public/rfc/bibxml/reference.RFC.7491.xml">
]>

<rfc category="info" docName="draft-kumar-i2nsf-controller-use-cases-00" ipr="trust200902">
  <front>
      <title abbrev="Security Controller: Use Case Summary">Security Controller: Use Case Summary </title>

    <author fullname="Rakesh Kumar" initials="R." surname="Kumar">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
            <street>1133 Innovation Way</street>
            <city>Sunnyvale</city>
            <region>CA</region>
            <country>US</country>
            <code>94089</code>
        </postal>
        <email>rkkumar@juniper.net</email>
      </address>
    </author>

    <author fullname="Anil Lohiya" initials="A." surname="Lohiya">
      <organization>Juniper Networks</organization>
      <address>
        <postal>
            <street>1133 Innovation Way</street>
            <city>Sunnyvale</city>
            <region>CA</region>
            <country>US</country>
            <code>94089</code>
        </postal>
        <email>alohiya@juniper.net</email>
      </address>
    </author>

    <author fullname="Dave Qi" initials="D." surname="Qi">
      <organization>Bloomberg</organization>
      <address>
        <postal>
            <street>731 Lexington Avenue</street>
            <city>New York</city>
            <region>NY</region>
            <country>US</country>
            <code>10022</code>
        </postal>
        <email>DQI@bloomberg.net</email>
      </address>
    </author>

    <author fullname="Xiaobo Long" initials="X." surname="Long">
      <organization></organization>
      <address>
        <postal>
            <street>4 Cottonwood Lane</street>
            <city>Warren</city>
            <region>NJ</region>
            <country>US</country>
            <code>07059</code>
        </postal>
        <email>long.xiaobo@gmail.com</email>
      </address>
    </author>

    <date year="2016" />
    <area>Security</area>
    <workgroup>I2NSF Working Group</workgroup>
    <keyword>I2NSF</keyword>

    <abstract>
        <t>This document provides use cases for the I2NSF security controller. The use cases described here are from a wide varierty of deployment scenarios in multipe market segments. The use cases would help in developing a comprehensive set of client interfaces.
        </t>
    </abstract>

</front>

<middle>

   <section anchor="introduction" title="Introduction">
       <t>In order to define and build client interfaces for the I2NSF security controller, we must understand the security industry landscape from the user&apos;s perspective and determine where I2NSF work could potentially be valuable. The use cases would help I2NSF to develop the client interface framework applicable to wide variety of deployment scenarios. Basically, without a set of use cases, it is hard to know whether the client interfaces, developed by I2NSF WG, actually meet the targeted industry requirements.</t>
       
       <t>This draft makes an attempt in categorizing the security users into various market segments and providing a list of common use cases in each market segment. This is by no means a complete list, but an attempt to list the most common use cases.</t>
           

   </section>

   <section anchor="conventions" title="Conventions Used in this Document">
      <t>
         <list style="hanging">
            <t hangText="EPC:"> (3GPPP) Evolved Packet Core.</t>

            <t hangText="FW:"> Firewall.</t>

            <t hangText="HW:"> Hardware </t>

            <t hangText="GLBA:"> Gramm-Leach-Bliley Act.</t>

            <t hangText="HIPAA:"> Health Insurance Portability and Accountability Act.</t>
            
            <t hangText="IDS:"> Intrusion Detection System.</t>

            <t hangText="IPS:"> Intrusion Protection System.</t>

            <t hangText="MEC:"> Mobile Edge Computing (ETSI-MEC).</t>
            
            <t hangText="NSF:"> Network Security Function, defined by <xref target="I-D.ietf-i2nsf-problem-and-use-cases" />.</t>
            

            <t hangText="PCI DSS:"> Payment Card Industry Data Security Standard.</t>

            <t hangText="RBAC:"> Role Based Access Control.</t>

            <t hangText="SP:"> (Telecom) Service Provider.</t>
            
            <t hangText="SW:"> Software.</t>
            
            <t hangText="SMB:"> Small and Medium-sized Business.</t>
            
            <t hangText="WAF:"> Web Application Firewall.</t>
            
            <t hangText="XaaS:"> Everything As a Service.</t>
         </list></t>
   </section>

   <section anchor="fwk" title="Security users">

      <t>There is a need for security solutions in almost every market segment,  but the use cases vary based on the requirements in that segment. It would not be feasible to look at every industry and list all the use cases. Instead, we categorize the industry into various groups or domains with each group having similar use cases.</t>

      <section anchor="sp" title="Telecommunication Service Provider">
         
         <t>The service providers need a large network presence to provide connectivity services to their clients and usually divide the large network into multiple domains or zones. We consider two such segments for security use cases.</t>
         
         <t>Access: This part of the network usually deals with basic connectivity, but lately this is undergoing rapid changes and services are being deployed for various use cases. There is a new working group ETSI MEC in this space.</t>
         
         <t>Core: This is where a service provider deploys 3G, 4G and other managed services. The SP&apos;s data center hosts various applications to deliver these services.</t>
         
      </section>
      
      <section anchor="ep" title="Enterprise">
          
         <t>The Enterprise network varies based on the organization&apos;s size and needs. We consider the following segments for use cases.</t>

         <t>Branch: An organization&apos;s remote location that hosts workers, some applications and data for efficiency reasons.</t>
         
         <t>Campus: An organization&apos;s regional or corporate headquarters where workers and applications are hosted. A small or medium Enterprise may have just one location where all workers and applications are hosted.</t>
         
         <t>Data Center: The large Enterprise may have multiple hosting places for their applications and data.</t>
 
      </section>
      
      <section anchor="csp" title="Cloud Service Provider">
          
          <t>The primary use cases for a cloud service provider are related to managed security services and security needs for deploying applications in the public cloud.</t>
          
          <t>Data Center: The Cloud Service Provider may have one or more locations to deliver all its services.</t>
          
      </section>
   </section>
   
   <section anchor="spu" title="SP Use Cases">
       
      <t>This includes residential and enterprise users with different requirements.</t>
      
         <section anchor="mss" title="Managed Security Services for residential mobile and SMB users">
             
             <t>The SP provides these as managed security services which may be bundled in the subscription or separately sold</t>
             <t>These services can be broadly categorized as the following:</t>
             <t>Parental Control:
                <list style="symbols">
                    <t>Block inappropriate web contents based on identity.</t>
                    <t>Filter web URLs.</t>
                    <t>Identity based usage controls on web contents.</t>
                    <t>Identity based usage controls on web contents.</t>
                </list></t>
         
             <t>Content Management:
                 <list style="symbols">
                     <t>Identify and block malicious activities from web contents</t>
                     <t>Attack mitigation using email cleaning and file scanning</t>
                 </list></t>
   
             <t>External Threat Management:
                 <list style="symbols">
                     <t>Identify and block threats such as malware and botnets</t>
                 </list></t>
         </section>

         <section anchor="mspe" title="Managed Security Services for Enterprise users">
         <t>The Enterprises are rapidly moving to the cloud. This comes with more services consumed from the cloud instead of being deployed at their premise. The reason for this is to cut costs and avoid constant HW/SW upgrades.</t>
         <t>The managed security services for Enterprise can be broken into two broad categories:</t>
      
            <t>External Threat Management:</t>
            <t>An Enterprise might subscribe to one of the following services.
            <list style="symbols">
                <t>Clean pipe, which means SP will filter known malwares, botnets and attack vectors</t>
                
                <t>DDoS attack mitigation.</t>
                
                <t>Application and phising attack mitigation</t>
                
                <t>Managed FW service as per Enterprise’s requirements</t>
                
                <t>WAF for regulatory or compliance reasons such as PCI</t>
            </list></t>
   
           <t>Lateral Threat Management:</t>
           <t>An Enterprise might subscribe to one of the following services in addition to connectivity services such as VPN.
           
            <list style="symbols">
                <t>Detect threats moving from one location to another within the organization using IPS, IDP and malware analysis</t>
                
                <t>Encryption services</t>
                
                <t>Endpoint security compliance management</t>
            </list></t>
            
         </section>

         <section anchor="pspi" title="Protect SP Infrastructure">
         <t>The SPs selling the security services must also protect their own infrastructure to ensure that there is no disruption to their customers.</t>
    
         <t>Threat Management:
         <list style="symbols">
            <t>Manage DDoS attacks on networking and server infrastructure.</t>
        
            <t>Identify and block botnets and malwares</t>
        
         </list></t>

         <t>Robust Service Delivery:
         <list style="symbols">
            <t>Deliver services such as VoIP, LTE, VPN in a secure manner</t>
            
            <t>Security for multi-tenant service delivery</t>
    
         </list></t>
         
         <t>Gi FW: The set of security features needed to protect the SP&apos;s mobile infrastructure and mobile user handset.
             <list style="symbols">
                 <t>Encryption services to secure mobile user’s identity</t>
                 
                 <t>Protocol attack mitigation using IPS, IDP and Application controls</t>
                 
                 <t>Block DoS/DDoS attack on mobile user end-point</t>
                     
                 <t>Block DoS/DDoS attack on EPC core elements</t>
                     
                 <t>Web content filtering</t>
                 
             </list></t>

         <t>GiLAN Services: The set of security services configured for mobile users.
            <list style="symbols">
               <t>FW Services</t>
    
               <t>Clean pipe service</t>
               
            </list></t>
                 
            <t>MEC Service Delivery: The set of security features needed to  deliver MEC services
                 <list style="symbols">
                     <t>MEC server protection from DDoS and malware attacks </t>
                     
                     <t>Encryption services</t>
                     
            </list></t>


         </section>
   </section>

   <section anchor="ebcu" title="Enterprise Branch and Campus Use Cases">
    
    <t>The Enterprise Branch and Campus security use cases are simple and usually related to threat management from Web. These are categorized as following:</t>
    
    <t>Threat Management:
        <list style="symbols">
            <t>Manage DDoS attacks on networking and server infrastructure</t>
            
            <t>Identify and block application attacks using IPS and IDP</t>
            
            <t>Identify and block attacks from the Web using WAF</t>
            
            <t>Identify and block botnets and malwares</t>
            
        </list></t>

    <t>Access and Data Management:
       <list style="symbols">
          <t>Isolation across various Enterprise functional groups</t>
        
          <t>Encryption service from Branch to Campus</t>
        
          <t>Block certain social media applications</t>
        
          <t>Data loss prevention by filtering social media contents</t>
        
       </list></t>

   </section>

   <section anchor="dcuc" title="Data Center Use Cases">
   <t>The Enterprise landscape is evolving rapidly due to virtualization and the move towards cloud based XaaS consumption models. The data centers are now built with mutli-vendor devices, in physical and virtual form factors. This creates a problem for data center operators as the attack vectors multiply.</t>
           
   <t>The cloud data centers have more dimensions such as a large presence and multi-tenant environment, but must still deliver services in a secure manner. The use cases in this category are fairly large and diverse, so we are listing the most common ones below:</t>
    
    <t>Threat Management: Same as above</t>
           
    <t>Regulatory and Compliance:
       <list style="symbols">
          <t>Payment industry&apos;s PCI DSS</t>
                
          <t>Finance industry&apos;s GLBA</t>
                
          <t>Health industry&apos;s HIPPA</t>
                
          <t>Orgnaziation&apos;s resource (Data and Application) access policy based on location or device</t>
                
       </list></t>

   </section>

   <section anchor="iana" title="IANA Considerations">
    
      <t>This document requires no IANA actions. RFC Editor: Please remove this section before publication.</t>
    
   </section>

   <section anchor="acks" title="Acknowledgements">
    
      <t> </t>
    
   </section>

</middle>
      
<back>
   <references title="Normative References">
      <?rfc include="reference.I-D.ietf-i2nsf-problem-and-use-cases"?>
   </references>
          
</back>
</rfc>