Rec. ITU-T X.1452 (10/2020) Guidelines for security services provided by operators
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of security services provided by operators
7 Typical use cases
     7.1 Secure connecting service
          7.1.1 Customer
          7.1.2 Technical onboarding
          7.1.3 Process
     7.2 Abnormal flow cleaning service
          7.2.1 Customer
          7.2.2 Technical onboarding
          7.2.3 Process
     7.3 Security monitoring service
          7.3.1 Customer
          7.3.2 Technical onboarding
          7.3.3 Process
     7.4 Anti-malicious mobile application service
          7.4.1 Customer
          7.4.2 Technical onboarding
          7.4.3 Process
8 Reference model of security service
9 Requirements for stakeholders
     9.1 The operator
          9.1.1 Functionalities to offer security services
          9.1.2 Operation support system
          9.1.3 Business support system
          9.1.4 Security management centre
          9.1.5 Customer service centre
     9.2 The equipment provider
          9.2.1 User equipment
          9.2.2 Information technology device
          9.2.3 Telecommunication device
     9.3 The third part security service provider
          9.3.1 Operation support system
          9.3.2 Business support system
          9.3.3 Security management centre
          9.3.4 Customer service centre
10 Security mechanisms
     10.1 Authentication
     10.2 Access control
     10.3 Security audit trails
     10.4 Authorization
     10.5 Availability
     10.6 Blacklist mechanism
     10.7 Communication security
     10.8 Data confidentiality
     10.9 Data integrity
     10.10 Non-repudiation
     10.11  Privacy protection
     10.12  Relationship of security mechanisms to the stakeholders
11 Reference procedures
Bibliography