[OIDFSC] AATOC Working Group Charter

Nat Sakimura sakimura at gmail.com
Wed Feb 25 00:56:50 UTC 2015


Dear Specs Council members,

It looks generally fine, with one friendly amendment:

Change the title of the working group from:
Abuse and Account Takeover Coordination Group

to:
Abuse and Account Takeover Coordination Working Group

as "Abuse and Account Takeover Coordination Group Working Group" is a bit
awkward.
I am fine with putting it as just "Abuse and Account Takeover Coordination"
as well, since there is a precedence for it.

Could any specs council member respond early in this thread if you have any
objection or friendly amendment. We have been a bit slack lately that we
have been relying on two weeks limit to execute a charter, but we should be
able to act more quickly.

Cheers,

Nat


2015-02-24 19:02 GMT+09:00 Adam Dawes <adawes at google.com>:

> I would like to form a new work group, AATOC. Here is our proposed charter:
>
> AATOC Charter
> 1) Working Group name:
>
> Abuse and Account Takeover Coordination Group (AATOC)
>
> 2) Purpose
>
> The goal of AATOC is to provide data sharing schemas, privacy
> recommendations and protocols to:
>
>
>    -
>
>    Share information about important security events in order to thwart
>    attackers from leveraging compromised accounts from one Service Provider to
>    gain access to accounts on other Service Providers (mobile or web
>    application developers and owners).
>    -
>
>    Enable users and providers to coordinate in order to securely restore
>    accounts following a compromise.
>
>
> Internet accounts that use email addresses or phone numbers as the primary
> identifier for the account will be the initial focus.
> 2) Scope
>
> The group will define:
>
>    -
>
>    Security events
>    These are events – whether directly authentication-related or
>    occurring at another time in the user flow – that take place on one service
>    that could also have security implications on other Service Providers. The
>    group will develop a taxonomy of security events and a common set of
>    semantics to express relevant information about a security event.
>
>    -
>
>    Privacy Implications
>    Sharing security information amongst providers has potential privacy
>    implications for both end users and service providers. These privacy
>    implications must be balanced against the recognized benefits of protecting
>    users’ accounts and data from abuse.  The group will consider ways to
>    optimize this balance when defining mechanisms to handle the various
>    security events and recommend best practices for the industry.
>
>
>
>    -
>
>    Communications mechanisms
>    Define bindings for the use of an existing transport protocol defined
>    elsewhere.
>
>
>
>    -
>
>    Event schema
>    Define a schema describing relevant events and relationships to allow
>    for dissemination between interested and authorized parties.
>
>
>
>    -
>
>    Account recovery mechanisms
>
> Standardized mechanism(s) to allow providers to signal that a user has
> regained control of an account, or allow a user to explicitly restore
> control of a previously compromised account, with or without direct user
> involvement.
> Out of scope:
>
> Determining the account quality/reputation of a user on a particular
> service and communicating that to others.
>
> Definition of APIs and underlying mechanisms for connecting to,
> interacting with and operating centralized databases or intelligence
> clearinghouses when these are used to communicate security events between
> account providers.
>
> 4) Proposed Deliverables
>
> The group proposes the following Non-Specification deliverables:
>
> Security Event and Account Lifecycle Schema
>
>    -
>
>    A taxonomy of security events and a common set of semantics to express
>    relevant information about a security event and its relationships to other
>    relevant data, events or indicators.
>
> Security Event Privacy Guidelines
>
> A set of recommendations on how to minimize the privacy impact on users
> and service providers while improving security, and how to provide
> appropriate privacy disclosures, labeling and access control guidelines
> around information in the Security Event Schema.
>
> The group proposes the following Specification deliverables:
>
> Communications Mechanisms
>
> Define bindings for the event messages to an already existing transport
> protocol to promote interoperability of sending event information to
> another Service Provider. This will allow a Service Provider to implement a
> single piece of infrastructure that would be able to send or receive event
> information to any other service provider.
>
> Order of Deliverables
>
> The group will work to produce the Security Event and Account Lifecycle
> Schema before beginning work on the Communications Mechanism.
>
> 5) Anticipated audience or users
>
>    -
>
>    Service Providers who manage their own account systems which require
>    an email address or phone number for registration.
>    -
>
>    Account and email providers that understand key security events that
>    happen to a user’s account.
>    -
>
>    Identity as a Service (IDaaS) vendors that manage account and
>    authentication systems for their customers.
>    -
>
>    Users seeking to regain control of a compromised account.
>
>
> 6) Language
>
> English
>
> 7) Method of work:
>
> E-mail discussions on the working group mailing list, working group
> conference calls, and face-to-face meetings from time to time.
>
> 8) Basis for determining when the work is completed:
>
> Rough consensus and running code. The work will be completed once it is
> apparent that maximal consensus on the draft has been achieved, consistent
> with the purpose and scope.
>
> Background information
> Related work:
>
>    -
>
>    RFC6545 Real-time Inter-network Defense (RID)
>    -
>
>    RFC6546 Transport of Real-time Inter-network Defense (RID) Messages
>    over HTTP/TLS
>    -
>
>    RFC6684 Guidelines and Template for Defining Extensions to the
>    Incident Object Description Exchange Format (IODEF)
>    -
>
>    draft-ietf-mile-rolie Resource-Oriented Lightweight Indicator Exchange
>    -
>
>    ISO/IEC 27002:2013  Information technology — Security techniques —
>    Code of practice for information security controls
>    -
>
>    ISO/IEC 27035:2011 Information technology — Security techniques —
>    Information security incident management
>
>
>
> Proposers
>
>    -
>
>    Adam Dawes, Google
>    -
>
>    Mark Risher, Google
>    -
>
>    Trent Adams, Paypal
>    -
>
>    George Fletcher, AOL
>    -
>
>    Andrew Nash, Confyrm
>    -
>
>    Nat Sakimura, Nomura Research Institute
>    -
>
>    John Bradley, Ping Identity
>    -
>
>    Henrik Biering, Peercraft
>
> Anticipated contributions:
>
> “Security event reporting between Service Providers 1.0” under the OpenID
> Foundation’s IPR Policy <http://openid.net/intellectual-property/>.
>



-- 
Nat Sakimura (=nat)
Chairman, OpenID Foundation
http://nat.sakimura.org/
@_nat_en
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openid.net/pipermail/openid-specs-council/attachments/20150225/9cbff044/attachment-0001.html>


More information about the specs-council mailing list