| Work item | Question | Equiv. Num. | Status | Timing | Approval process | Version | Liaison relationship | Subject / Title | Priority |
| X.1130 (ex X.tg-fdma) | Q7/17 | | Determined 2025-04-17 | 2025-04 | TAP | New | - | Technical guidelines for detecting malicious activities of mobile applications | Medium |
| X.1457 (ex X.str-irs) | Q7/17 | | Determined 2025-04-17 | 2025-04 | TAP | New | - | Security threats and requirements for information recommendation service | - |
| X.1910 (ex X.tc-ifd) | Q7/17 | | Determined 2025-12-11 | 2026-06 | TAP | New | - | Technical capabilities of interactive deception risk detection | Low |
| X.2210 (ex X.ig-dw) | Q7/17 | | Determined 2025-12-11 | 2026-Q3 | TAP | New | SG16 | Implementation guidelines for digital watermarking | Medium |
| X.AA-LLM | Q7/17 | | Under study | 2026-Q4 | AAP | New | ITU-T SG11, SG20, SG21; ISO/IEC JTC 1/SC 42 | Guidelines for Preventing and Mitigating Adversarial Attacks on LLMs in Metaverse and Digital Twin Environments | Medium |
| X.AI-App_policy | Q7/17 | | Under study | 2026-06 | TAP | New | ISO/IEC JTC 1/SC 27, SC 42, ETSI SAI. | Reference architecture for AI-assisted analysis of consistency between App's data usage behaviour and its privacy policy | Medium |
| X.AI-gcd | Q7/17 | | Under study | 2027-01 | AAP | New | ITU-T SG21, ISO/IEC JTC 1/SC 42, NIST | Guidelines for Artificial Intelligence-generated content detection | Medium |
| X.APIRSD | Q7/17 | | Under study | 2027-Q3 | AAP | New | - | Technical requirements for public API runtime security risk detection | Medium |
| X.fr-vsasi | Q7/17 | | Under study | 2027-Q2 | AAP | New | - | Functional requirements for visualization service of network security assets and security incidents based on digital twin | - |
| X.gavd-mas | Q7/17 | | Under study | 2027-12 | AAP | New | ISO/IEC JTC 1/ SC 27 | Guidelines for application vulnerability detection using multi-agent system | Medium |
| X.GenAI-FT | Q7/17 | | Under study | 2027-03 | AAP | New | ISO/IEC JTC 1/SC 27, SC 42, ETSI SAI | Security guidelines for fine-tuning generative AI model | Medium |
| X.ias | Q7/17 | | Under study | 2026-03 | AAP | New | ISO/IEC JCT1 SC27 WG2&WG5, IETF Security OAuth | Functional requirements for the integrated authentication service of telecommunication operators | - |
| X.LLMCC | Q7/17 | | Under study | 2027-12 | TAP | New | ITU-T SG21, ISO/IEC JTC 1/SC 27, IETF TEEP, IETF RATS | Guidelines for large language model data security based on confidential computing | Medium |
| X.pg-cla | Q7/17 | | Under study | 2027-Q3 | AAP | New | ITU-T SG13, ISO/IEC JTC1/SC 42, ETSI | Guideline for continual learning to actively respond to network attacks | Medium |
| X.rg-dis | Q7/17 | | Under study | 2027-12 | TAP | New | ITU-T SG21 | Requirements for guidelines for data interaction security in training and inference stages of generative Artificial Intelligence | Medium |
| X.S-AIA | Q7/17 | | Under study | 2027-03 | AAP | New | ITU-T SG21/Q5 | Security requirements and guidelines for Artificial Intelligence agent | Medium |
| X.sec-grp-mov | Q7/17 | | Under study | 2026-06 | TAP | New | - | Security guideline for group movement service platform | Low |
| X.sec-va | Q7/17 | | Under study | 2027-10 | AAP | New | ITU-T SG13 (WP1/13) | Security guidelines for vertical applications within the IMT-2020 ecosystem | Medium |
| X.sg-eAI | Q7/17 | | Under study | 2027-10 | AAP | - | ITU-T SG21 | Security requirements and guidelines for embodied artificial intelligence systems | Medium |
| X.sgfems | Q7/17 | | Under study | 2027-01 | TAP | New | ITU-T SG20, IEC TC65 | Security requirements and guidelines for factory energy management system | Medium |