Jan21-summary
|
Page Content Executive Summary ITU-T SG17 'Security' special e-plenary, 13:30-15:41, 7 January 2021 Objective: - taking decisions on the eight seven texts identified by SG17 closing plenary (3 September 2020) (ref. SG17-R76R1) for action at this special e-plenary
Meeting Output:
- TAP approval: 3 new Recommendations X.1217, X.1368 and X.1376. Details are in Annex A a).
- Actions on four other items are deferred to next SG17 meeting, see Annex A b).
- SG17 Task force will lead preparation for the 1st SG17 meeting in 2021, focusing on SG17 WP structure and leadership.
Future SG17 meetings - Tuesday 20 – Friday 30 April 2021, fully virtual meeting, 9 working days at 10:00-16:00 Geneva time
- Open and extended management team meeting on Monday 19 April 2021, 13:30-15:00
- The SG17 Task force established by SG17 on 3 Sept 2020 (ref. ToR in TD3228) will lead preparation for next SG17 meeting, focusing on WP structure and leadership assuming TSAG Jan 2021 will endorse the new Question structure of SG17 as submitted in TSAG-TD982R1.
- 22 texts are candidate for action in SG17 April 2021 meeting, see in Annex A c).
- Tuesday 24 August – Thursday 2 September 2021 (8 working days), hopefully a physical meeting in Geneva
- Open and extended SG17 management team meeting on Monday 23 August 2021
- To consider a 1-day SG17 e-plenary in January 2022, similar to this SG17 e-plenary on 7 January 2021.
Interim RGMs:
-
| Q | Date | Place/Host | Subject/objective | 1. | 3/17 | 1-2 February 2021 | e-meeting | - To address issues of X.1054rev
| 2. | 4/17 | 1-2 February 2021 | e-meeting | - To address and discuss of X.sec-QKDN-km
| 3. | 6/17 | 4 February 2021 | e-meeting | - To address and discuss of X.1811
|
Participation: - 91 participants: 14 countries, 17 Sector Members and 2 Academia. 1 invited expert.
Annex A Actions taken on Recommendations, and other texts at the 7 January 2021 plenary a) TAP Recommendations approved (WTSA-16 Resolution 1): Q(1) | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Start of work | Timing | 4/17 | X.1217 (X.fgati) | Guidelines for applying threat intelligence in telecommunication network operation | New | Yexia Chang, Lanfang Ren, Min Zuo | R72 |
| 2018-03 | 2020-09 | 6/17 | X.1368 (X.secup-iot) | Secure firmware/software update for Internet of things (IoT) devices | New | Yunchul Choi, Koji Nakao, Takeshi Takahashi | TD3470R1 | | 2017-09 | 2020-09 | 13/17 | X.1376 (X.mdcv) | Security-related misbehaviour detection mechanism using big data for connected vehicles | New | Yuming Ge, Jianxin Liu, Minrui Yan, Yi Zhang | R74 | | 2018-03 | 2020-09 |
b) Work items deferred for action in next SG17 April 2021 meeting Action | Q(1) | Acronym | Title | New / Revised | Editor(s) | Location of Text | Equivalent e.g., ISO/IEC | Start of work | Timing | TAP approval | 3/17 | X.1054rev
| Information security, cybersecurity and privacy protection - Governance of information security | Rev | Jinghua Min, Thaib Mustafa, Anfona Traore | R56 | ISO/IEC 27014
| 2020-03 | 2021-04
| AAP consent | 4/17 | X.sec-QKDN_km
| Security requirements and designs for quantum key distribution networks - key management | New | Kaoru Kenyoshi, Jiajun Ma, Hao Qin, Dong-Hi Sim | TD3316 | | 2019-01 | 2021-04 | TAP approval | 6/17 | X.1811 (X.5Gsec-q) | Security guidelines for applying quantum-safe algorithms in 5G systems | New | Yanfei Guo, Zhiyuan Hu, Zhaoji Lin, Fuwen Liu, Min Zuo | TD3352 | | 2018-03 | 2021-04 | New work item for agreement | 10/17 | X.1251rev | A framework for user control of digital identity | Rev | Abbie Barbir | C872 Note: contributor plans to submit a new C to next SG17 meeting
| | |
|
c) Candidate texts for action in next SG17 April 2021 meeting Q | Acronym | Title | New / Revised | Editor(s) | Location of text | Equivalent e.g., ISO/IEC | Start of work | Timing | 3/17
| X.1054rev**
| Information security, cybersecurity and privacy protection - Governance of information security
| Rev | Jinghua Min, Thaib Mustafa, Anfona Traore | R56 | ISO/IEC 27014 | 2020-03 | 2021-04
| 3/17
| X.ciag | Cyber insurance acquisition guideline for Information and Communication Technologies (ICT) services provider | New | Thaib Mustafa, Ong Yew Seng | TD3416 | | 2019-01 | 2021-04 | 3/17 | X.framcdc | Framework for the creation and operation of a cyber defence center | New | Arnaud Taddei | TD3398 | | 2018-03 | 2021-04 | 3/17
| X.sup-csc***
| Supplement to X.1051: Critical security controls for telecommunication organization information and network security management in support of ITU-T X.1051 | New | Patrice Payen, Mustafa Thaib, Arnaud Taddei | TD1971 | | 2018-09 | 2021-04 | 4/17 | X.sec-QKDN_km | Security requirements and designs for quantum key distribution networks - key management | New | Kaoru Kenyoshi, Jiajun Ma, Hao Qin, Dong-Hi Sim | TD3316
| | 2019-01 | 2021-04 | 5/17 | TR.cs-ml***
| Technical Report: Countering spam based on machine learning | New | Wei Liu, Ye Tao | TD3314 | | 2019-09 | 2021-04 | 5/17 | X.1246rev* | Technologies involved in countering voice spam in telecommunication organizations | Rev | Dmitry Cherkesov, Yanbin Zhang | TD2838 | | 2019-09 | 2021-04 | 5/17 | X.1247rev* | Technical framework for countering mobile messaging spam | Rev | Dmitry Cherkesov, Yanbin Zhang | TD2838 | | 2019-09 | 2021-04 | 5/17 | X.gcims* | Guidelines for countering spam over instant messaging | New | Huamin Jin, ChangOh Kim, Laifu Wang, Shuai Wang, Yanbin Zhang | TD3304 | | 2017-09 | 2021-04 | 5/17
| X.tecwes* | Technologies in countering website spoofing for telecommunication organizations
| New | Ruzhen Hu, Meng Nan, Chen Zhang | TD3349 | | 2018-03 | 2021-04 | 6/17
| X.1811** (X.5Gsec-q) | Security guidelines for applying quantum-safe algorithms in 5G systems | New | Yanfei Guo, Zhiyuan Hu, Zhaoji Lin, Fuwen Liu, Min Zuo | TD3352
| | 2018-03 | 2021-04 | 8/17 | X.sgBDIP | Security guidelines for big data infrastructure and platform | New | Arnaud Taddei, Ye Tao, Laifu Wang | TD3332 | | 2018-03 | 2021-04 | 8/17 | X.sgcc* | Security guidelines for container in cloud computing environment | New | Lanfang Ren, Ye Tao, Laifu Wang, Lei Xu | TD3334 | | 2018-09 | 2021-04 | 8/17 | X.sr-cphr | Security requirements of cloud-based platform under low latency and high reliability application scenarios | New | Jie Ma, Nan Meng, Yaping Sun, Huirong Tian | TD2840 | | 2019-01 | 2021-04 | 9/17 | X.b2m
| Biology to machine protocol | New | Erik Andersen, John Caras, Myung Geun Chun | TD3272 | | 2018-09 | 2021-04 | 10/17
| X.1252rev**
| Baseline identity management terms and definitions
| Rev
| Abbie Barbir
| R77
| | 2018-03
| 2021-04 | 10/17
| X.upu*
| UPU S68 Postal identity management framework
| New
| Abbie Barbir, Gustavo Damy
| TD2507
| UPU S68
| 2019-09
| 2021-04
| 11/17 | X.672rev | Information technology – Open systems interconnection – Object identifier resolution system | Rev | RuiFen Mu, Linjian Song | TD3276 | ISO/IEC 29168-1 | 2020-03 | 2021-04 | 11/17, (10/17) | X.pki-em | Information Technology – Public Key Infrastructure: Establishment and maintenance | New | Erik Andersen | TD2493 | | 2014-01 | 2021-04 | 14/17 | X.srip-dlt | Security requirements for intellectual property management based on distributed ledger technology | New | Jung Yeon Hwang, Yuhee Ki, Min Shu, Wenlei Wang, Yang Wu, Yunwei Zhao | TD3229 | | 2018-09 | 2021-04 | 14/17 | X.stov | Security threats to online voting using distributed ledger technology | New | Byoung-Moon Chin, ChangOh Kim, Keundug Park, Heung Youl Youm | TD3297 | | 2017-09 | 2021-04 | 14/17 | X.str-dlt | Security threats and requirements for DLT | New | Kyeong Hee Oh, ChangOh Kim, Preetika Singh | TD3300 | | 2017-09 | 2021-04
|
Note:
* marked is for TAP determination; ** marked is for TAP approval; *** marked is for approval by SG17 agreement; no mark is for AAP consent
|
|
|
|
|