CONTENTS

 1     Scope 
        1.1     X.805 principles    
        1.2     Assumptions          
        1.3     Overview  
 2     References 
 3     Definitions and abbreviations        
        3.1     Terms defined elsewhere    
        3.2     Terms defined in this Recommendation       
        3.3     Abbreviations and acronyms          
 4     Security threats and risks 
 5     Security trust model         
        5.1     Single network trust model 
        5.2     Peering network trust model           
 6     Security architecture        
        6.1     Functional NGN architecture reference      
        6.2     Mapping to NGN functional architecture    
        6.3     Identification of NGN resources for security protection       
 7     Objectives and requirements        
        7.1     General security objectives 
        7.2     Objectives for security across multiple network provider domains   
        7.3     Requirements specific for security dimensions         
 8     Specific security requirements      
        8.1     Common security requirements for NGN elements 
        8.2     Requirements for NGN elements in the trusted zone           
        8.3     Requirements for NGN border elements in the "trusted-but-vulnerable" domain       
        8.4     Requirements for TE border elements in the "un-trusted" domain     
        8.5     Security recommendations for terminal equipment in the "un-trusted" domain           
Appendix I – Security objectives and guidelines for interconnection of emergency telecommunications services    
        I.1        Background         
        I.2        Scope/purpose    
        I.3        General objectives           
        I.4        General security capabilities          
        I.5        Authentication, authorization and access control    
        I.6        Confidentiality and privacy           
        I.7        Data integrity       
        I.8        Communication    
        I.9        Availability           
Bibliography