[OIDFSC] AATOC Working Group Charter

Adam Dawes adawes at google.com
Tue Feb 24 10:02:29 UTC 2015


I would like to form a new work group, AATOC. Here is our proposed charter:

AATOC Charter
1) Working Group name:

Abuse and Account Takeover Coordination Group (AATOC)

2) Purpose

The goal of AATOC is to provide data sharing schemas, privacy
recommendations and protocols to:


   -

   Share information about important security events in order to thwart
   attackers from leveraging compromised accounts from one Service Provider to
   gain access to accounts on other Service Providers (mobile or web
   application developers and owners).
   -

   Enable users and providers to coordinate in order to securely restore
   accounts following a compromise.


Internet accounts that use email addresses or phone numbers as the primary
identifier for the account will be the initial focus.
2) Scope

The group will define:

   -

   Security events
   These are events – whether directly authentication-related or occurring
   at another time in the user flow – that take place on one service that
   could also have security implications on other Service Providers. The group
   will develop a taxonomy of security events and a common set of semantics to
   express relevant information about a security event.

   -

   Privacy Implications
   Sharing security information amongst providers has potential privacy
   implications for both end users and service providers. These privacy
   implications must be balanced against the recognized benefits of protecting
   users’ accounts and data from abuse.  The group will consider ways to
   optimize this balance when defining mechanisms to handle the various
   security events and recommend best practices for the industry.



   -

   Communications mechanisms
   Define bindings for the use of an existing transport protocol defined
   elsewhere.



   -

   Event schema
   Define a schema describing relevant events and relationships to allow
   for dissemination between interested and authorized parties.



   -

   Account recovery mechanisms

Standardized mechanism(s) to allow providers to signal that a user has
regained control of an account, or allow a user to explicitly restore
control of a previously compromised account, with or without direct user
involvement.
Out of scope:

Determining the account quality/reputation of a user on a particular
service and communicating that to others.

Definition of APIs and underlying mechanisms for connecting to, interacting
with and operating centralized databases or intelligence clearinghouses
when these are used to communicate security events between account
providers.

4) Proposed Deliverables

The group proposes the following Non-Specification deliverables:

Security Event and Account Lifecycle Schema

   -

   A taxonomy of security events and a common set of semantics to express
   relevant information about a security event and its relationships to other
   relevant data, events or indicators.

Security Event Privacy Guidelines

A set of recommendations on how to minimize the privacy impact on users and
service providers while improving security, and how to provide appropriate
privacy disclosures, labeling and access control guidelines around
information in the Security Event Schema.

The group proposes the following Specification deliverables:

Communications Mechanisms

Define bindings for the event messages to an already existing transport
protocol to promote interoperability of sending event information to
another Service Provider. This will allow a Service Provider to implement a
single piece of infrastructure that would be able to send or receive event
information to any other service provider.

Order of Deliverables

The group will work to produce the Security Event and Account Lifecycle
Schema before beginning work on the Communications Mechanism.

5) Anticipated audience or users

   -

   Service Providers who manage their own account systems which require an
   email address or phone number for registration.
   -

   Account and email providers that understand key security events that
   happen to a user’s account.
   -

   Identity as a Service (IDaaS) vendors that manage account and
   authentication systems for their customers.
   -

   Users seeking to regain control of a compromised account.


6) Language

English

7) Method of work:

E-mail discussions on the working group mailing list, working group
conference calls, and face-to-face meetings from time to time.

8) Basis for determining when the work is completed:

Rough consensus and running code. The work will be completed once it is
apparent that maximal consensus on the draft has been achieved, consistent
with the purpose and scope.

Background information
Related work:

   -

   RFC6545 Real-time Inter-network Defense (RID)
   -

   RFC6546 Transport of Real-time Inter-network Defense (RID) Messages over
   HTTP/TLS
   -

   RFC6684 Guidelines and Template for Defining Extensions to the Incident
   Object Description Exchange Format (IODEF)
   -

   draft-ietf-mile-rolie Resource-Oriented Lightweight Indicator Exchange
   -

   ISO/IEC 27002:2013  Information technology — Security techniques — Code
   of practice for information security controls
   -

   ISO/IEC 27035:2011 Information technology — Security techniques —
   Information security incident management



Proposers

   -

   Adam Dawes, Google
   -

   Mark Risher, Google
   -

   Trent Adams, Paypal
   -

   George Fletcher, AOL
   -

   Andrew Nash, Confyrm
   -

   Nat Sakimura, Nomura Research Institute
   -

   John Bradley, Ping Identity
   -

   Henrik Biering, Peercraft

Anticipated contributions:

“Security event reporting between Service Providers 1.0” under the OpenID
Foundation’s IPR Policy <http://openid.net/intellectual-property/>.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-council/attachments/20150224/3d0aadab/attachment-0001.html>


More information about the specs-council mailing list