Last Call Review of draft-ietf-teas-applicability-actn-slicing-07
review-ietf-teas-applicability-actn-slicing-07-secdir-lc-dunbar-2024-08-09-00
Request | Review of | draft-ietf-teas-applicability-actn-slicing |
---|---|---|
Requested revision | No specific revision (document currently at 10) | |
Type | Last Call Review | |
Team | Security Area Directorate (secdir) | |
Deadline | 2024-08-13 | |
Requested | 2024-07-25 | |
Requested by | Jim Guichard | |
Authors | Daniel King , John Drake , Haomian Zheng , Adrian Farrel | |
I-D last updated | 2024-08-09 | |
Completed reviews |
Rtgdir Early review of -06
by Tony Przygienda
(diff)
Rtgdir Last Call review of -07 by Alvaro Retana (diff) Secdir Last Call review of -07 by Linda Dunbar (diff) Opsdir Last Call review of -07 by Joe Clarke (diff) Genart Last Call review of -07 by Peter E. Yee (diff) |
|
Assignment | Reviewer | Linda Dunbar |
State | Completed | |
Request | Last Call review on draft-ietf-teas-applicability-actn-slicing by Security Area Directorate Assigned | |
Posted at | https://mailarchive.ietf.org/arch/msg/secdir/ztnmK6Uuytv5kWAMgIAVxYBgKI0 | |
Reviewed revision | 07 (document currently at 10) | |
Result | Has issues | |
Completed | 2024-08-09 |
review-ietf-teas-applicability-actn-slicing-07-secdir-lc-dunbar-2024-08-09-00
I have reviewed this document as part of the SEC area directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the Security area directors. Document editors and WG chairs should treat these comments just like any other last-call comments Section 6, paragraph 4 highlights the customer's responsibility for end-to-end security, even when utilizing secure network slices as a service provided by their service providers. This raises several questions: - Does the document imply that customers should not trust the secure network slices offered by service providers? - It might be beneficial for the document to specify criteria or guidelines that customers can use to evaluate the security and integrity of secure network slices as a service. Providing such criteria would help customers make informed decisions and ensure they meet their security requirements. Thank you, Linda Dunbar