Recommendation ITU-T F.743.23 (10/2023) Security requirements for video surveillance systems
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 PU device security classification
7 Functional requirements
     7.1 PU access security requirements
          7.1.1 Access control
          7.1.2 Vulnerability assessment
          7.1.3 Trusted surveillance
          7.1.4 Equipment authentication
          7.1.5 Data encryption
          7.1.6 Attack protection
     7.2 Transmission security requirements
          7.2.1 Transmission encryption
          7.2.2 Digital signature
     7.3 Platform security requirements
          7.3.1 Virtual network security
          7.3.2 Host-network security
          7.3.3 Storage security
          7.3.4 Identity security
          7.3.5 Video content filtering
     7.4 Application security requirements
          7.4.1 Video leak proof
          7.4.2 Authorisation management
     7.5 Network security requirements
          7.5.1 Access control
          7.5.2 Network protection
     7.6 Security management centre requirements
          7.6.1 Asset management
          7.6.2 Key infrastructure
          7.6.3 Security situational awareness
Appendix I  Typical use case and scenario
     I.1 PU authentication
     I.2 Security hardening of video surveillance systems
     I.3 Detect and block malicious threats and send alerts