CONTENTS

 1     Scope 
        1.1     Purpose  
        1.2     Relationship with X.805 Security Architecture        
        1.3     Relationship with E.408 telecommunication networks security requirements 
 2     References 
 3     Terms and definitions       
 4     Abbreviations and acronyms        
 5     Conventions     
 6     Security requirements       
        6.1     Verification of identities      
        6.2     Controlled access and authorization
        6.3     Protection of confidentiality
        6.4     Protection of data integrity 
        6.5     Accountability        
        6.6     Security logging and audit   
        6.7     Security alarm reporting     
        6.8     Protection of the DCN       
Annex A – Mapping of security requirements, services and mechanisms    
Appendix I – Additional security considerations    
        I.1        Applicability to enterprise operations, administration, maintenance and provisioning           
        I.2        Common object request broker architecture, simple network management protocol, extensible markup language, and simple object access protocol    
        I.3        Lawfully authorized electronic surveillance
        I.4        Physical security considerations    
        I.5        Development process       
Appendix II – Framework and design guidelines    
       II.1     Framework and model       
       II.2     Design guidelines    
Appendix III – Semantics of terms used in the M.3016.x series    
BIBLIOGRAPHY