Table of Contents - X.1010 (05/2025) - Guidelines for the security orchestration of the service access process
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Challenges for building service access process 7 Security requirements of service access process 8 Functional framework for security orchestration of service access process 8.1 Overview of the reference framework 8.2 Component capabilities 9 Procedures for security orchestration of service access process 9.1 Registration and operational status monitoring process for functional modules 9.2 Process for distributing network and security policies 9.3 Process for execution of policies 10 Stakeholders involved in the functional framework for security orchestration of the service access process 10.1 Overview 10.2 User 10.3 Security function provider 10.4 Network function provider 10.5 System integrator 11 The implementation modes of functional framework for security orchestration of the service access process 11.1 Implementation mode based on multiple security providers 11.2 Multi-network providers based implementation mode 11.3 Multiple security and multiple network providers based implementation mode Annex A – Extension of functional framework for security orchestration of service access process with other technologies A.1 Advanced user requirements collection framework based on the intent-driven approach A.2 Advanced policy execution framework based on playbook A.3 Advanced policy optimization framework based on data analysis techniques A.4 Mixing multiple advanced frameworks Bibliography
|