Rec. ITU-T X.1606 (09/2020) Security requirements for communications as a service application environments
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of CaaS
7 Security threats to CaaS
     7.1 Identity threats
          7.1.1 Identity credential theft
          7.1.2 Identity counterfeit
     7.2 Account lifecycle management threats
     7.3 Orchestration threat
     7.4 Terminals context threat
     7.5 Spam threat and malware distribution
     7.6 Add-on threat
     7.7 Software development kit threat
     7.8 Threats from telecommunication networks vulnerabilities
8 Security requirements for CaaS
     8.1 Identity and access management
          8.1.1 Identity management
          8.1.2 Access control
          8.1.3 Identity verification
          8.1.4 Account management
     8.2 Terminal security
          8.2.1 Internal security
          8.2.2 External security
     8.3 Service security
          8.3.1 Orchestration security
          8.3.2 Countering spam
     8.4 Security coordination
          8.4.1 Add-on and SDK security
          8.4.2 Infrastructure security
Appendix I  A quick guide to the security threats and challenges listed in  Recommendation ITU-T X.1601
Appendix II  A mapping of security threats and security requirements
Bibliography