Skip to content

Commit

Permalink
add use cases
Browse files Browse the repository at this point in the history
  • Loading branch information
nallott committed Jul 19, 2024
1 parent 25e5487 commit a37190d
Show file tree
Hide file tree
Showing 8 changed files with 121 additions and 3 deletions.
6 changes: 3 additions & 3 deletions packages/docusaurus/docs/CAHN/10-intro.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,11 @@ slug: /
title: Introduction
---

Nquiringminds is developing Continuous Assurance for Heterogeneous Networks (CAHN). New technology that underpins network-of-networks, with novel identity models and zero-trust security. [[1](https://www.ukri.org/news/major-future-telecoms-research-boost-announced/#:~:text=UKRI%20is%20investing%20%C2%A370,foundational%20role%20in%20communication%20networks.)]
Continuous Assurance for Heterogeneous Networks (CAHN) is a new technology that underpins network-of-networks, with novel identity models and zero-trust security. [[1](https://www.ukri.org/news/major-future-telecoms-research-boost-announced/#:~:text=UKRI%20is%20investing%20%C2%A370,foundational%20role%20in%20communication%20networks.)]

Nick Allott, CEO of NquiringMinds comments: “Our concept of continuous assurance, builds on some innovative work that has been developed within NIST" [[2](https://www.nccoe.nist.gov/projects/trusted-iot-device-network-layer-onboarding-and-lifecycle-management)]
CAHN, delivers continuous assurance, by building on some innovative work that has been developed within NIST as part of the trusted network-layer onboarding program [[2](https://www.nccoe.nist.gov/projects/trusted-iot-device-network-layer-onboarding-and-lifecycle-management)]

CAHN will develop new architectures working across networks. It will use advanced nations of identity and distributed credentials, combined with dynamic (AI) reasoning to dynamically infer trustworthiness and assurance. We will work with many different use case and endpoints, with use cases that include Digital Secure by Design hardware silicon to protect against memory vulnerabilities developed with ARM and University of Cambridge. [[3](https://www.dsbd.tech/)][[4](https://www.arm.com/architecture/cpu/morello)]
CAHN will develop new architectures working across networks. It will use advanced notions of identity and distributed credentials, combined with dynamic (AI) reasoning to dynamically infer trustworthiness and assurance. We will work with many different use case and endpoints, with use cases that include Digital Secure by Design hardware silicon to protect against memory vulnerabilities developed with ARM and University of Cambridge. [[3](https://www.dsbd.tech/)][[4](https://www.arm.com/architecture/cpu/morello)]

## Verifiable Credential Technology

Expand Down
118 changes: 118 additions & 0 deletions packages/docusaurus/docs/CAHN/20-uses-cases.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,121 @@
---
title: Use Cases
---

In this section we will summarise the high level use cases we hope to address with CAHN.

## Terminology

Before enumerating the use cases it is useful to establish some common terminology

* **Candidate device**: the physical device which is attempting to connect to the network
* **Onboarded device:** the device which is physically connected to the network
* **Device owner**: the person or organisation which is the legal owner of the device.
* **Target network**: the logical network the device is trying to join
* **Onboarding network**: a constrained logical network that can be used to negotiate the onboarding process
* **Physical network**: an instance of a physical network, which may host either/both of the target and onboarding networks
* **Network owner**: the person or organisation which is the legal owner of the device.

## Use case overview

The use cases listed below define at a the highest level, what we are trying to achieve, with the new architecture.

## UC: Zero touch on boarding

The candidate device will establish a full connection to the onboarding network with no physical intervention by the device owner or network owner.

The objective is to define the protocols that allow this connection to be established using information and credentials available before the physical onboarding event.

The precise conditions under which the device is onboarded are outlined in the policy use case.

## UC: Network independent identity

We would like to be able to onboard a device to multiple network types and instances using the same principle identity.

The key attributes used to determine the success of the network, should be independent of the network instance.

## UC: Continuous Assurance

The security posture of the device should be continuously evaluated in the background and the device be ejected from the network should the policy evaluation fail.

The precise conditions under which the device is off boarded are outlined in the policy use case.



## UC: Policy management

It should be easy for the network owner to actively manage and change the current policy for the target network.

The policy should be extensible, and flexible, capable of supporting many security features and business models



## UC: Policy dimensions (onboarding)

To test the extensibility of the policy framework we have some very concrete polices in scope.

These are listed at a high level as follows.

1. Device owner is trusted by network owner
2. Manufacturer recognisees provenance of device (it was made by this manufacturer)
3. Manufacturer recognised specific device identity (this device came off the factory process)
4. Network owner trusts manufacturer (will allow checks to be made)
5. Network owner trusts specific device identity
6. Network owner trust device type
7. Network owner has "payment credentials" for device owner
8. Network owner accepts testing credentials presented for device type
9. Network owner accepts testing credentials presented for device instance
10. Network owner accepts the MUD descriptor for this device (type)
11. Network owner accepts the MUD descriptor and places it on an appropriate subnet
12. Network owner accepts SBOM of device
13. Network owner accepts SBOM and validates it conforms to export restriction
14. Network owner accepts SBOM and validates it conforms to license restriction
15. Network owner accepts SBOM and validates that identified vulnerabilities are below threshold



## UC: Policy dimensions (continuous assurance)

Most of the onboarding checks can be assessed continuously, using a zero trust approach .

The appropriate assurance tests are listed below.



1. Device owner is **no longer** trusted by network owner: e.g. they are no longer a customer
2. Manufacturer **no longer** recognises provenance of device (it was made by this manufacturer): e.g it has been identified that a signing key has become compromised
3. Manufacturer **no longer** recognises specific device identity (this device came off the factory process). e.g it has been identified that a signing key has become compromised
4. Network owner **no longer** trusts manufacturer (will allow checks to be made). e.g company has been acquired, or government has stipulated that it cannot be trusted.
5. Network owner **no longer** trusts specific device identity. e.g. device has been reported stolen
6. Network owner **no longer** trust device type e.g. device type has been discontinued and no longer supported
7. Network owner **no longer** has "payment credentials" for device owner e.g. device owner has not paid his bill
8. Network owner **no longer** accepts testing credentials presented for device type e.g. faults has been found in testing procedure
9. Network owner **no longer** accepts testing credentials presented for device instance e.g. faults has been found in testing procedure
10. Network owner **no longer** accepts the MUD descriptor for this device (type) e.g. network security policy has changed
11. Network owner **no longer** accepts the MUD descriptor and places it on an appropriate subnet e.g. network security policy has changed
12. Network owner **no longer** accepts SBOM of device e.g. device security policy has changed
13. Network owner **no longer** accepts SBOM and validates it conforms to export restriction. e.g. export restrictions have changed
14. Network owner **no longer** accepts SBOM and validates it conforms to license restriction. e.g. license restrictions have changed
15. Network owner **no longer** accepts SBOM and validates that identified vulnerabilities are below threshold . e.g. new vulnerabilities have been disclosed

## UC: Ease of integration

The enhanced identity and policy enforcement mechanisms of CAHN should be easy to retro fit onto existing networks

## UC: Networks in scope

The CAHN security policy should work with multiple network types. Currently in scope.

1. 5G CRAN network
2. WIFI network
3. Lora WAN network
4. Satellite network

Additionally we may consider application layer networks such as SSH or VPN connections which can be established virtually.







0 comments on commit a37190d

Please sign in to comment.