Table of Contents - X.1010 (05/2025) - Guidelines for the security orchestration of the service access process

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Challenges for building service access process
7 Security requirements of service access process
8 Functional framework for security orchestration of service access process
8.1 Overview of the reference framework
8.2 Component capabilities
9 Procedures for security orchestration of service access process
9.1 Registration and operational status monitoring process for functional modules
9.2 Process for distributing network and security policies
9.3 Process for execution of policies
10 Stakeholders involved in the functional framework for security orchestration of the service access process
10.1 Overview
10.2 User
10.3 Security function provider
10.4 Network function provider
10.5 System integrator
11 The implementation modes of functional framework for security orchestration of the service access process
11.1 Implementation mode based on multiple security providers
11.2 Multi-network providers based implementation mode
11.3 Multiple security and multiple network providers based implementation mode
Annex A – Extension of functional framework for security orchestration of service access process with other technologies
A.1 Advanced user requirements collection framework based on the intent-driven approach
A.2 Advanced policy execution framework based on playbook
A.3 Advanced policy optimization framework based on data analysis techniques
A.4 Mixing multiple advanced frameworks
Bibliography