<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.mglt-i2rs-security-environment-reqs" target="https://datatracker.ietf.org/doc/html/draft-mglt-i2rs-security-environment-reqs-01">
   <front>
      <title>I2RS Environment Security Requirements</title>
      <author initials="D." surname="Migault" fullname="Daniel Migault">
         <organization>Ericsson</organization>
      </author>
      <author initials="J. M." surname="Halpern" fullname="Joel M. Halpern">
         <organization>Ericsson</organization>
      </author>
      <author initials="S." surname="Hares" fullname="Susan Hares">
         <organization>Huawei</organization>
      </author>
      <date month="October" day="2" year="2015" />
      <abstract>
	 <t>   This document provides environment security requirements for the I2RS
   architecture.  Environment security requirements are independent of
   the protocol used for I2RS.  As a result, the requirements provided
   in this document are intended to provide good security practise so
   I2RS can be securely deployed and operated.

   These security requirements are designated as environment security
   requirements as opposed to the protocol security requirements
   described in [I-D.ietf-i2rs-protocol-security-requirements].  The
   reason to have separate document is that protocol security
   requirements are intended to help the design of the I2RS protocol
   whether the environment requirements are rather intended for
   deployment or implementations.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-mglt-i2rs-security-environment-reqs-01" />
   
</reference>
