Skip to main content

Last Call Review of draft-ietf-teas-applicability-actn-slicing-07
review-ietf-teas-applicability-actn-slicing-07-secdir-lc-dunbar-2024-08-09-00

Request Review of draft-ietf-teas-applicability-actn-slicing
Requested revision No specific revision (document currently at 10)
Type Last Call Review
Team Security Area Directorate (secdir)
Deadline 2024-08-13
Requested 2024-07-25
Requested by Jim Guichard
Authors Daniel King , John Drake , Haomian Zheng , Adrian Farrel
I-D last updated 2024-08-09
Completed reviews Rtgdir Early review of -06 by Tony Przygienda (diff)
Rtgdir Last Call review of -07 by Alvaro Retana (diff)
Secdir Last Call review of -07 by Linda Dunbar (diff)
Opsdir Last Call review of -07 by Joe Clarke (diff)
Genart Last Call review of -07 by Peter E. Yee (diff)
Assignment Reviewer Linda Dunbar
State Completed
Request Last Call review on draft-ietf-teas-applicability-actn-slicing by Security Area Directorate Assigned
Posted at https://mailarchive.ietf.org/arch/msg/secdir/ztnmK6Uuytv5kWAMgIAVxYBgKI0
Reviewed revision 07 (document currently at 10)
Result Has issues
Completed 2024-08-09
review-ietf-teas-applicability-actn-slicing-07-secdir-lc-dunbar-2024-08-09-00
I have reviewed this document as part of the SEC area directorate's ongoing
effort to review all IETF documents being processed by the IESG.  These
comments were written primarily for the benefit of the Security area directors.
Document editors and WG chairs should treat these comments just like any other
last-call comments

Section 6, paragraph 4 highlights the customer's responsibility for end-to-end
security, even when utilizing secure network slices as a service provided by
their service providers. This raises several questions:

- Does the document imply that customers should not trust the secure network
slices offered by service providers?

- It might be beneficial for the document to specify criteria or guidelines
that customers can use to evaluate the security and integrity of secure network
slices as a service. Providing such criteria would help customers make informed
decisions and ensure they meet their security requirements.

Thank you,

Linda Dunbar