Security architecture for Open Systems Interconnection for CCITT applications |
|
Recommendation ITU-T X.800:
a) provides a general description of security services and related mechanisms, which may be provided by the Reference Model; and
b) defines the positions within the Reference Model where the services and mechanisms may be provided.
This Recommendation extends the field of application of Recommendation X.200, to cover secure communications between open systems.
Basic security services and mechanisms and their appropriate placement have been identified for all layers of the Reference Model. In addition, the architectural relationships of the security services and mechanisms to the Reference Model have been identified. Additional security measures may be needed in end systems, installations and organizations. These measures apply in various application contexts. The definition of security services needed to support such additional security measures is outside the scope of the Recommendation.
|
|
Citation: |
https://handle.itu.int/11.1002/1000/3102 |
Series title: |
X series: Data networks, open system communications and security X.800-X.849: Security |
Approval date: |
1991-03-22 |
Identical standard: | ISO/IEC 7498-2:1989 (Twinned) |
Approval process: | TAP |
Status: |
In force |
Maintenance responsibility: |
ITU-T Study Group 17 |
Further details: |
Patent statement(s)
|
|
|
|
ITU-T Supplement
|
Title
|
Status
|
Summary
|
Table of contents
|
Download
|
X Suppl. 2 (09/2007)
|
ITU-T X.800-X.849 series – Supplement on security baseline for network operators
|
In force
|
here
|
here
|
here
|
X Suppl. 3 (04/2008)
|
ITU-T X.800-X.849 series – Supplement on guidelines for implementing system and network security
|
In force
|
here
|
here
|
here
|
X Suppl. 15 (09/2012)
|
ITU-T X.800-X.849 series - Supplement on guidance for creating a national IP-based public network security centre for developing countries
|
In force
|
here
|
here
|
here
|
X Suppl. 16 (09/2012)
|
ITU-T X.800-X.849 series – Supplement on architectural systems for security controls for preventing fraudulent activities in public carrier networks
|
In force
|
here
|
here
|
here
|
Title |
Approved on |
Download |
Guidelines for identity-based cryptosystems used for cross-domain secure communications
|
2023
|
here
|
Overview of hybrid approaches for key exchange with quantum key distribution
|
2022
|
here
|
Guidelines for security management of using artificial intelligence technology
|
2022
|
here
|
Successful use of security standards (2nd edition)
|
2020
|
here
|
Description of the incubation mechanism and ways to improve it
|
2020
|
here
|
Strategic approaches to the transformation of security studies
|
2020
|
here
|
Security in telecommunications and information technology (7th edition)
|
2020
|
here
|
Security in Telecommunications and Information Technology
|
2015
|
here
|
Security in Telecommunications and Information Technology
|
2011
|
here
|
Security in Telecommunications and Information Technology
|
2004
|
here
|
Security in Telecommunications and Information Technology
|
2003
|
here
|
|