Committed to connecting the world

  •  
wtisd

ITU-T work programme

[2013-2016] : [SG5] : [Q10/5]

[Declared patent(s)]  - [Publication]

Work item: K.87
Subject/title: Guide for the application of electromagnetic security requirements - Overview
Status: Approved on 2016-06-29 
Approval process: AAP
Type of work item: Recommendation
Version: Rev.
Equivalent number: -
Timing: -
Liaison: -
Supporting members: -
Summary: General guidelines of information security management for telecommunications organizations are presented in Recommendation ITU-T X.1051, which is based on ISO/IEC 27001 and ISO/IEC 27002. In an information security management system (ISMS) based on Recommendation X.1051, physical security is a key issue, as shown for example in the following text presented in Recommendation X.1051: "a site whose environment is least susceptible to damage from strong electromagnetic field shall be selected for communication centres; where a site is chosen that is exposed to strong electromagnetic fields, appropriate measures should be taken to protect telecommunications equipment rooms with electromagnetic shields;" "controls should be adopted to minimize the risk of potential physical threats, e.g., theft, fire, explosives, smoke, water (or water supply failure), dust, vibration, chemical effects, electrical supply interference, communications interference, electromagnetic radiation, and vandalism[.]" When security is managed considering the quoted passages, the threat to equipment or site should be evaluated and mitigated. The threat is related to "vulnerability" and "confidentiality" in ISMS. This Recommendation, Recommendation ITU-T K.87, outlines electromagnetic security risks of telecommunication equipment and illustrates how to assess and prevent those risks, in order to manage ISMS in accordance with Recommendation ITU-T X.1051. Major electromagnetic security risks addressed in this Recommendation are as follows: o natural electromagnetic (EM) threats (e.g., lightning); o unintentional interference (i.e., electromagnetic interference, EMI); o intentional interference (i.e., intentional electromagnetic interference, IEMI); o deliberate EM attacks via high-altitude electromagnetic pulse (HEMP); o deliberate high-power electromagnetic (HPEM) attacks; o information leakage from EM emanation (i.e., electromagnetic security, EMSEC); o mitigation methods against electromagnetic security threats.
Comment: -
Reference(s):
  Historic references:
-
Contact(s):
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2016-05-10 16:04:37
Last update: 2016-07-05 11:46:00