ITU

Committed to connecting the world

ITU-T liaison statement database

Incoming liaison statements allocated to an ITU-T Study Group meeting (*)

ITU-T Study Group
Meeting
Type of action
With title containing all these words 
Full search in ITU-T LSs Database
Total found: 40 Page Size:
 
12
CSA - LS 3  -  [http://ifa.itu.int/t/2013/ls/csa/sp15-csa-iLS-00003.pdf]
LS/i from Cloud Security Alliance to ITU-T Study Group 17 [from CSA]
Approved on 2013-08-30.
For action to: -
For comment to: -
For information to: Q6/17; Q8/17; Q10/17
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0655
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27/WG 4 N 243  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00054.zip]
LS on Text 2nd WD 27033-1 - Text for ISO/IEC 2nd WD 27033-1, Information technology - Security techniques - Network security - Part 1: Overview and concepts [N12658 from ISO/IEC JTC 1/SC 27]
Approved on 2013-08-27.
For action to: -
For comment to: Q2/17
For information to: -
Deadline: 2013-10-22
Submitted as: T13-SG17-130826-TD-PLEN-0574
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27/WG 4 N 244  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00055.zip]
LS on Text 2nd WD 27044 - Text for ISO/IEC 2nd WD 27044, Information technology - Security techniques - Guidelines for security information and event management (SIEM) [N12677 from ISO/IEC JTC 1/SC 27]
Approved on 2013-08-27.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: 2013-10-22
Submitted as: T13-SG17-130826-TD-PLEN-0575
Meeting: Geneva, 26 August - 4 September 2013
IEC TC 25 - 25/470/NP  -  [http://ifa.itu.int/t/2013/ls/iectc25/sp15-iectc25-iLS-00003.pdf]
LS on update of IEC/TC 25 Activities [from IEC/TC 25]
Approved on 2013-08-22.
For action to: Q9/17
For comment to: -
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0564
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12691  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00053.pdf]
LS on Text for ISO/IEC FDIS 27033-4, Information technology - Security techniques - Network security - Part 4: Securing communications between networks using security gateways
Approved on 2013-08-19.
For action to: -
For comment to: Q7/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0563
Meeting: Geneva, 26 August - 4 September 2013
ITU-R SG 5 - 5A/239 - 5B/226 - 5C/144 - 5D/313  -  [http://ifa.itu.int/t/2013/ls/itu-rsg5/sp15-itu-rsg5-iLS-00019.docx]
LS/r on request to provide security contacts
Approved on 2013-07-24 in response to SG17 - LS 8.
For action to: -
For comment to: -
For information to: Q1/17
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0553
Meeting: Geneva, 26 August - 4 September 2013
SG15 - LS 59  -  [http://ifa.itu.int/t/2013/ls/sg15/sp15-sg15-oLS-00059.docx]
LS on new versions of the Access Network Transport (ANT) Standardization Overview and Work Plan
Approved on 2013-07-12.
For action to: Q1/17
For comment to: -
For information to: -
Deadline: 2014-03-01
Submitted as: T13-SG17-130826-TD-PLEN-0547
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12429  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00038.zip]
LS on Text for ISO/IEC 5th WD 27017 based on DoC (N12767) - Information technology - Security techniques - Code of practice for information security controls for cloud computing services based on ISO/IEC 27002 [N12429 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: Q8/17
For comment to: -
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0533
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12518  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00039.pdf]
LS on Liaison Statement to ITU-T SG 17 [N12518 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: Q1/17; WP1/17; Q4/17; Q8/17; Q9/17; Q10/17
For comment to: -
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0534
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12650  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00040.pdf]
LS on Report 2nd SP Sec Cloud Tech Stds - Report on the 2nd study period in the area of Cloud security technology standards [N12650 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: -
For information to: Q8/17
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0535
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12681  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00041.zip]
LS on ISO/IEC 3rd CD 27040 - Information technology - Security techniques - Storage security [N12681 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q1/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0536
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12683  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00042.zip]
LS on ISO/IEC CD 27041 - Information technology -- Security techniques - Guidance on assuring suitability and adequacy of incident investigation methods [N12683 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0537
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12685  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00043.zip]
LS on ISO/IEC 2nd CD 27042 - Information technology -- Security techniques - Guidelines for the analysis and interpretation of digital evidence [N12685 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0538
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12689  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00044.pdf]
LS on Text for ISO/IEC DIS 27039 - Information technology - Security techniques - Selection, deployment and operations of intrusion detection and prevention systems (IDPS) [N12689 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0539
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12666  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00045.zip]
LS on 3rd WD 27034-6 - Text for Information technology - Security techniques - Application security - Part 6: Security guidance for specific applications [N12666 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q7/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0540
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12668  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00046.zip]
LS on 3rd WD 27035-1 - Text for ISO/IEC 3rd WD 27035-1, Information technology - Security techniques - Information security incident management - Part 1: Principles of incident management [N12668 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0541
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12670  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00047.zip]
LS on 3rd WD 27035-2 - Text for ISO/IEC 3rd WD 27035-2, Information technology - Security techniques - Information security incident management - Part 2: Guidelines to plan and prepare for incident response [N12670 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0542
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12672  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00048.zip]
LS on 3rd WD 27035-3 - Text for ISO/IEC 3rd WD 27035-3, - Security techniques - Information security incident management - Part 3: Guidelines for incident response operations [N12672 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0543
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12679  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00049.zip]
LS on 1st WD 27050 - Text for ISO/IEC 1st WD 27050, Information technology - Security techniques - Electronic discovery [N12679 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0544
Meeting: Geneva, 26 August - 4 September 2013
ISO/IEC JTC1/SC27 - N12687  -  [http://ifa.itu.int/t/2013/ls/isoiecjtc1sc27/sp15-iso_iecjtc1_sc27-iLS-00050.zip]
LS on ISO/IEC 2nd CD 27043 - Information technology -- Security techniques - Incident investigation principles and processes [N12687 from ISO/IEC JTC 1/SC27]
Approved on 2013-07-12.
For action to: -
For comment to: Q3/17; Q4/17
For information to: -
Deadline: -
Submitted as: T13-SG17-130826-TD-PLEN-0545
Meeting: Geneva, 26 August - 4 September 2013
12
(*) Please inform any discrepancies or missing information to the respective Stugy Group secretariat.