{"draft":"draft-mm-wg-effect-encrypt-25","doc_id":"RFC8404","title":"Effects of Pervasive Encryption on Operators","authors":["K. Moriarty, Ed.","A. Morton, Ed."],"format":["ASCII","HTML"],"page_count":"53","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"IETF - NON WORKING GROUP","abstract":"Pervasive monitoring attacks on the privacy of Internet users are of\r\nserious concern to both user and operator communities. RFC 7258\r\ndiscusses the critical need to protect users' privacy when developing\r\nIETF specifications and also recognizes that making networks\r\nunmanageable to mitigate pervasive monitoring is not an acceptable\r\noutcome: an appropriate balance is needed. This document discusses\r\ncurrent security and network operations as well as management\r\npractices that may be impacted by the shift to increased use of\r\nencryption to help guide protocol development in support of\r\nmanageable and secure networks.","pub_date":"July 2018","keywords":["NETCONF","RESTCONF","Monitoring","Management","Security Management","Operations"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC8404","errata_url":null}