This page will soon be deactivated—explore our new, faster, mobile-friendly site, now centralized in MyWorkspace!

Connecting the world and beyond

  •  
Submarine cables

ITU-T Recommendations

Search by number:
Others:
Skip Navigation Links
Content search
Advanced search
Provisional name
Equivalent number
Formal description
Study Groups tree viewExpand Study Groups tree view

ITU-T X.1010 (05/2025)

عربي | 中文 | English | Español | Français | Русский
Guidelines for the security orchestration of the service access process
Security requirements on one service access process need to be met based on security capabilities with the support of network capabilities. The existence of multidomain introduces different security requirements of different domains and interdomain access control security requirements in the service access process, which are variable and diverse. Therefore, the distributed, complex and diverse security protections of the network need to be orchestrated in coordination with network routing in order to protect the service access process.
Network operators need to have the ability to orchestrate security capabilities and network capabilities to provide such a secure network to protect the service access process. This new work item describes the orchestration framework to help all stakeholders build, integrate, interact and manage a secure service access process in a secure and low-cost way.
Citation: https://handle.itu.int/11.1002/1000/16380
Series title: X series: Data networks, open system communications and security
  X.1000-X.1099: Information and network security
  X.1000-X.1011: Security orchestration and service access
Approval date: 2025-05-29
Provisional name:X.so-sap
Approval process:AAP
Status: In force
Maintenance responsibility: ITU-T Study Group 17
Further details: Patent statement(s)
Development history
[15 related work items in progress]