1
Scope
1.1 X.805 principles
1.2 Assumptions
1.3
Overview
2
References
3
Definitions
and abbreviations
3.1
Terms
defined elsewhere
3.2 Terms
defined in this Recommendation
3.3
Abbreviations
and acronyms
4
Security
threats and risks
5 Security trust model
5.1 Single
network trust model
5.2 Peering network trust model
6
Security
architecture
6.1
Functional
NGN architecture reference
6.2
Mapping
to NGN functional architecture
6.3
Identification
of NGN resources for security protection
7 Objectives and requirements
7.1
General
security objectives
7.2
Objectives
for security across multiple network provider domains
7.3
Requirements
specific for security dimensions
8
Specific
security requirements
8.1
Common
security requirements for NGN elements
8.2
Requirements
for NGN elements in the trusted zone
8.3 Requirements for NGN border elements
in the "trusted-but-vulnerable" domain
8.4
Requirements
for TE border elements in the "un-trusted" domain
8.5
Security recommendations for terminal equipment in the
"un-trusted" domain
Appendix I – Security objectives and guidelines for
interconnection of emergency telecommunications services
I.1
Background
I.2
Scope/purpose
I.3
General objectives
I.4
General security capabilities
I.5
Authentication, authorization and
access control
I.6
Confidentiality and privacy
I.7
Data integrity
I.8 Communication
I.9 Availability
Bibliography