Table of Contents - X.1818 (09/2024) - Security controls for operation and maintenance of IMT-2020/5G network systems
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 6.1 Specific terms for threat and control in this Recommendation 6.2 Structure of this Recommendation 6.3 How to use this Recommendation 7 Security threats for IMT-2020/5G systems 7.1 Generic security threats 7.2 Threats to NFV infrastructure and MANO 7.3 Threats to NFV workloads 7.4 Threats to radio access network 7.5 Threats to core network 7.6 Threats to network slicing 7.7 Threats to MEC 8 Security controls for IMT-2020/5G system 8.1 Organizational controls 8.2 People controls 8.3 Operational controls 8.4 Physical controls 8.5 Technical controls Appendix I – Key technical concepts of IMT-2020/5G systems I.1 The IMT-2020/5G system I.2 Network function virtualization I.3 Network slicing I.4 Multi-access edge computing I.5 Criticality of IMT-2020/5G system domains Bibliography
|