T REC X.Sup23 201409 I!!PDF E
T REC X.Sup23 201409 I!!PDF E
T REC X.Sup23 201409 I!!PDF E
ITU-T Series X
TELECOMMUNICATION Supplement 23
STANDARDIZATION SECTOR
OF ITU (09/2014)
Summary
Supplement 23 to ITU-T X-series Recommendations provides security management guidelines for the
implementation of IPv6 environment in telecommunication organizations in order to ensure the
protection of information in the networks and protection of the supporting network infrastructure when
transitioning from IPv4 to IPv6 and implementing an IPv6 environment.
History
Edition Recommendation Approval Study Group Unique ID*
1.0 ITU-T X Suppl. 23 2014-09-26 17 11.1002/1000/12332
____________________
* To access the Recommendation, type the URL http://handle.itu.int/ in the address field of your web
browser, followed by the Recommendation's unique ID. For example, http://handle.itu.int/11.1002/1000/11
830-en.
NOTE
In this publication, the expression "Administration" is used for conciseness to indicate both a
telecommunication administration and a recognized operating agency.
Compliance with this publication is voluntary. However, the publication may contain certain mandatory
provisions (to ensure, e.g., interoperability or applicability) and compliance with the publication is achieved
when all of these mandatory provisions are met. The words "shall" or some other obligatory language such as
"must" and the negative equivalents are used to express requirements. The use of such words does not suggest
that compliance with the publication is required of any party.
ITU 2014
All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior
written permission of ITU.
1 Scope
This Supplement provides security management guidelines for the implementation of IPv6
environment in telecommunications organizations in order to ensure the protection of information in
the networks and protection of the supporting network infrastructure when transitioning from IPv4 to
IPv6 and implementing IPv6 environment.
2 References
[ITU-T X.1037] Recommendation ITU-T X.1037 (2013), IPv6 technical security guidelines.
[ITU-T X.1051] Recommendation ITU-T X.1051 (2008), Information technology – Security
techniques – Information security management guidelines for
telecommunications organizations based on ISO/IEC 27002.
[IETF RFC 2460] IETF RFC 2460 (1998), Internet Protocol, Version 6 (IPv6) Specification.
[IETF RFC 4941] IETF RFC 2460 (2007), Privacy Extensions for Stateless Address
Autoconfiguration in IPv6.
[IETF RFC 5722] IETF RFC 5722 (2009), Handling of Overlapping IPv6 Fragments.
3 Definitions
The definitions given in [ITU-T X.1037] apply.
5 Conventions
None.
6 Overview
The Internet protocol version 6 (IPv6) is intended to succeed IPv4, which is the protocol currently
used to direct almost all of the Internet traffic. The Internet operates by transferring data between
hosts using an addressing scheme, such as IPv4 or IPv6, to specify their source and destination
addresses. Each host, computer or other device on the Internet, requires an IP address in order to
communicate. The growth of the Internet has created a need for more addresses than are possible with
IPv4.
IPv4 has allocated a space of 32 bits for IP addresses, which means that overall 232 (4 294 967 296)
addresses exist in the IPv4 space. However, the IPv4 address space becomes exhausted with the
overall growth of the Internet.
IPv6 was developed by the Internet Engineering Task Force (IETF) to deal with this long-anticipated
IPv4 address exhaustion and is described in [IETF RFC 2460]. IPv6 uses 128-bit addresses, for an
address space of 2128 (approximately 3.4×1038) addresses. This equates to 665 570 793 348 866 943
898 599 addresses per square meter of the earth surface, and is equivalent to every individual on this
earth having more than 40 000 IPv6 subnets assigned – this will therefore be sufficient for many more
devices and users to use the Internet. This expansion allows for many more devices and users on the
Internet as well as extra flexibility in allocating addresses and efficiency for routing traffic.
Despite of the well-known problem of IP address exhaustion, organizations in large parts of the world
have been hesitant in changing over from IPv4 to IPv6. Organizations need to develop a migration
strategy from IPv4 to IPv6, especially for ensuring continued communication around the world.
However, IPv6 deployment is not easy to manage. There are a number of considerations an
organization should take into account, and this supplement describes some of important processes
required for information security management.
8.1 Overview
As the above considerations have demonstrated, an organization should apply some thoughts before
migrating from IPv4 to IPv6. As IPv6 is the future and is inevitably coming, organizations should
develop a strategy to identify their approach to this change. This strategy should take into account the
business impacts and risks associated with this change and should make implementation decisions
based on the impacts and risks and the possibilities that the organizations have to address the risks.
This should be followed by an implementation of the IPv4 to PIv6 strategy to initiate and complete
the change in the best way for the organization. Once the change has been completed, the
implemented solutions should be audited and reviewed to ensure that everything is working as
intended.
9.1 Overview
This clause provides definitions for new objectives, new controls and new implementation guidance,
as examples of practical security controls for IPv6 deployment in telecommunication organization.
The following clauses are candidates of topics for security controls to be applied for IPv6 deployment.
Series E Overall network operation, telephone service, service operation and human factors
Series F Non-telephone telecommunication services
Series G Transmission systems and media, digital systems and networks
Printed in Switzerland
Geneva, 2014