1
Scope
1.1
Purpose
1.2
Relationship
with X.805 Security Architecture
1.3
Relationship
with E.408 telecommunication networks security requirements
2
References
3
Terms and definitions
4
Abbreviations
and acronyms
5
Conventions
6
Security requirements
6.1
Verification
of identities
6.2
Controlled
access and authorization
6.3
Protection
of confidentiality
6.4
Protection
of data integrity
6.5
Accountability
6.6
Security
logging and audit
6.7
Security
alarm reporting
6.8
Protection
of the DCN
Annex A –
Mapping of security requirements, services and mechanisms
Appendix I
– Additional security considerations
I.1
Applicability to enterprise operations,
administration, maintenance and provisioning
I.2
Common object request broker architecture,
simple network management protocol, extensible markup language, and simple
object access protocol
I.3
Lawfully authorized electronic
surveillance
I.4
Physical security considerations
I.5
Development process
Appendix II
– Framework and design guidelines
II.1
Framework
and model
II.2
Design
guidelines
Appendix
III – Semantics of terms used in the M.3016.x series
BIBLIOGRAPHY