Smart Security / Security Services
The target outcomes address consolidation of results on:
- Availability, accessibility, and affordability of technologies supporting the necessary levels of resilience, openness, transparency, and dependability expected under the EU regulations (such as GDPR, Cyber Security Act and AI Act) across a complete service continuum, supporting complex human centric multimodal communications, including entangled devices.
- Availability, accessibility, and affordability of technologies ensuring secure, privacy preserving and trustworthy services in the context of a programmable platform for the complete life cycle of services, accessed by multi-stakeholders and tenants including vertical industries as users, for increasingly dynamic scenarios considering interdependencies between components and cascade effects that may be produced separately.
- Zero-touch security deployment solutions for virtualized and distributed environments, taking into account the varying computational capabilities and security requirements of their building blocks and their interactions with third-party entities.
- Algorithms, software and hardware implementations where appropriate, which can be used for PoC and later trials systems Dissemination of solutions for international consensus building, which can be exploited in standardisation activities.
- Impactful contributions to international standardisation.
Please refer to the "Specific Challenges and Objectives" section for Stream B-04 in the Work Programme, available under ‘Topic Conditions and Documents - Additional Documents’.
Scope:The focus of this topic is on several complementary areas mentioned below and applicants may select one or more of these areas.
- Building secure 6G architecture integrating Security Services and Security attributes of 6G services. The topic deals with frameworks that will enable full life cycle service integration across multiple stakeholders. This encompasses, but not limited to, considerations for security evaluation, exposition of Security attributes, holistic composition of services in multi-provider environments, user centric monitoring/reporting capabilities.
- Secure services and security Services, including, but not limited to, user-centric security, advanced security schemes applicable to 6G APIs, intent-based security, with security policies extraction, seamless integration of Managed Security Service Providers into the 6G architecture.
- Security evaluation, including, but not limited to, continuous security assessment (in all phases of the system life cycle from development, including Safe code, DevSecOps to running phases), development of standardized metrics to evaluate security quality, design of appropriate certification frameworks, secure coding practices, vulnerability management during development, and secure deployment and update procedures.
Note: Applicants should clearly identify the areas/priorities they address in case they only cover a subset.