Recommendation ITU-T X.1011 (10/2021) Guidelines for continuous protection of the service access process
Summary
History
FOREWORD
Table of Contents
1 Scope
2 References
3 Definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Security threats of the service access process
     6.1 Insufficiency of perimeter-based security mechanism
     6.2 Risk of exposing services
     6.3 Risk of unknown devices
     6.4 Internal threat
     6.5 Privilege abuse
     6.6 Leakage of sensitive information about access requests
7 Security requirements of the service access process
8 Reference framework for continuous protection of the service access process
     8.1 Overview of the service access process reference framework
     8.2 Logical functions of continuous protection
          8.2.1 Access protection decision
               8.2.1.1 Security data collection and detection (SDCD)
               8.2.1.2 Dynamic protection decision
               8.2.1.3 Access protection response
               8.2.1.4 Security integrate interface
          8.2.2 Access proxy
               8.2.2.1 Features of access proxy
               8.2.2.2 Model of access proxy
     8.3 Workflow
Appendix I   Typical application scenarios
Bibliography
<\pre>