Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Overview of information security measures
 7     Information security measures        
        7.1     Access control              
        7.2     Authentication            
        7.3     Non-repudiation        
        7.4     Data confidentiality   
        7.5     Communication security          
        7.6     Data integrity
        7.7     Availability     
        7.8     Privacy            
Annex A – Additional technical implementation guidance    
        A.1     Secure configuration
        A.2     Malware protection  
        A.3     Patch management  
        A.4     Vulnerability management    
        A.5     Information security incidents management  
        A.6     System development security
        A.7     Authentication for information systems and applications          
        A.8     Data leakage prevention         
        A.9     Operations security   
       A.10     Backup and disaster recovery              
       A.11     Desktop PC and mobile device protection      
Appendix I – Organizational implementation guidance    
        I.1     Information security policies   
        I.2     Organization of information security   
        I.3     Human resources security       
        I.4     Asset management    
        I.5     Physical and environment security       
        I.6     Supplier relationship  
Appendix II – Level of security assurance    
       II.1     Level of assurance for entity authentication [b-ITU-T X.1254]   
       II.2     Level of security assurance      
Appendix III – Guidance on assigning specific level of security assurance from the final index    
      III.1     Methodology for level of security assurance    
Appendix IV – SGSN specific implementation guideline    
       IV.1     Overview      
       IV.2     Access control dimension for module 1             
       IV.3     Availability dimension for module 1    
       IV.4     Non repudiation dimension for module 1         
       IV.5     Authentication dimension for module 1            
       IV.6     Data integrity dimension for module 
       IV.7     Privacy and data confidentiality dimension for module 1           
       IV.8     Communication security dimension for module 1         
Bibliography